TWI246005B - Method and system for user-determined attribute storage in a federated environment - Google Patents

Method and system for user-determined attribute storage in a federated environment Download PDF

Info

Publication number
TWI246005B
TWI246005B TW92130499A TW92130499A TWI246005B TW I246005 B TWI246005 B TW I246005B TW 92130499 A TW92130499 A TW 92130499A TW 92130499 A TW92130499 A TW 92130499A TW I246005 B TWI246005 B TW I246005B
Authority
TW
Taiwan
Prior art keywords
user
attribute information
provider
attribute
scope
Prior art date
Application number
TW92130499A
Other languages
Chinese (zh)
Other versions
TW200419379A (en
Inventor
George Robert Blakley Iii
Heather Maria Hinton
Birgit Monika Pfitzmann
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US10/334,605 priority Critical patent/US7797434B2/en
Application filed by Ibm filed Critical Ibm
Publication of TW200419379A publication Critical patent/TW200419379A/en
Application granted granted Critical
Publication of TWI246005B publication Critical patent/TWI246005B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos

Abstract

A system is presented for facilitating management of user attribute information at one or more attribute information providers (AIPs), which can manage the user's attribute information in accordance with user-selected or administratively-determined options, including options that are stored in attribute release policies and/or dynamically determined during a transaction. E-commerce service providers (ECSPs), such as online banks or merchants, also maintain a relationship with an AIP such that the ECSP can trust the user attribute information that is provided by the AIP on behalf of the user. The user can complete transactions that require user attribute information at any ECSP without having to have previously established a relationship with that particular ECSP. If the ECSP has a relationship with one of the user's AIPs, then the user will be able to direct the ECSP to an AIP when the ECSP needs user attribute information to complete a transaction for the user.

Description

1246005 发明 Description of the invention: Cross-reference of related applications This application is related to the following applications with a common assignee: US patent application serial number (list of agent litigation cases No. CH920020006), proposed (to be determined), title For `` Efficient browser-based identity management providing personal control and anonymity, f; US patent application serial number (list of litigation cases of agents No. AUS9-2000-0770-US1), filed on November 9, 2000, titled ' 'Method and system for Web-based cross-domain singlesign-on authentication " US patent application serial number (Agent No. AUS920010769US1), date of filing (to be determined), titled `` System and method for user enrollment in an e-communityM; US patent application serial number (list of agent litigation cases No. AUS920020386US1? Tiger), proposed (to be determined), titled " Method and system for user-determined authentication in a federated environment ''; the United States Patent application serial number ( List of Litigation Cases No. AUS9200203 No. 87US1), date of filing (to be determined), titled "Method and system for user enrollment of user attribute storage in a federated environment"; US patent application serial number (No. AUS920020726US1), proposed (to be determined), titled "Method

O: \ 89 \ 89077 DOC 1246005 and system for enroll-thru operations and reprioritization operations in a federated environment; "Meth〇d and

System for Attribute Exchange m Heterogeneous Federated Environment’’o [Technical Field of the Invention] The present invention relates to an improved data processing system, and in particular, to a method and device for multi-computer data transfer. Even more particularly, the present invention provides a method and device for distributed data storage and data transfer of user information. [Previous Technology] The Internet has greatly facilitated the exchange of information for many purposes. Many applications already incorporate Internet-related standards. This allows some organizations to collaborate on the Internet while maintaining a private network. At Tongji Temple, where applications connected to the Internet are becoming more and more complex, some organizations have expressed expectations that they will not increase the level of cooperation, especially in the so-called joint environment. In a joint environment, each user usually logs in to the main network domain that provides some basic services, such as _, π, ^, and a silly j. When the user logs in to the user's main domain through some form of private sequence, the user will be allowed to access the main domain in accordance with the authorization given by the user. Protect resources. ^ -Γ '& Looks like this user has a permanent relationship with this user's primary domain. 5

O: \ 89 \ 89077.DOC 1246005: Second outside ’The main domain may be in the —federated or —federated environment 0. Xi /, his domain has a permanent relationship, ^ ^ also known as the business-to-business chapter) 〆 son community domain. A coalition might ^ + Chi Second, we must not or may not participate Wen's a distinct territory between a set of pairwise wash in the industry, Shang only vegetables relationship. In a joint field or organization, resources may be shared with users in the joint environment ft domain or organization to a certain process. Eight The more people know about the Internet, the two of them will cooperate with each other to reduce the burden on one user. These expectations also apply to the management of the information-poor properties, sometimes referred to as situations and, under certain restrictions, a user can be born in some ways-once he or she has User information is given to a computer to make it easy for users to use it. The current conversation may be available regardless of the various computer boundaries that are sometimes invisible to the user. Pen U L meets these expectations in terms of the operating characteristics that they are equipped with, and not only soothes the user but also increases user efficiency, regardless of whether the user efficiency is related to staff productivity or user satisfaction. More specifically, for the current computing environment that uses many applications of a web-based user interface accessible via a general browser, users expect to be friendlier and less or less obstructive to users. From one web-based application to another. In this case, 'users expect to be able to move from one Internet application to another _application' on one application's M domain. Least concerned about those information barriers between each specific domain. Even though many systems provide easy-to-use web-based interfaces', however, a user may still be forced

〇 \ 89 \ 89077 DOC 1246005 ff Handle multiple user data, "trust or request" for users to move through the group domain. Allow a user to encounter multiple information requests or requests that greatly affect users within the new time. Efficiency. Most systems of user attributes in S are designed to work in a single enterprise rather than in a loosely connected organizational federation environment. Therefore, when more organizations participate in a federated computing environment, Obstacles to user information requests or requests are becoming more common. ^ As mentioned above, in a federated environment, users logged in to-members of an organization-can access remote locations controlled by another organization Resources; each—the organization is responsible for managing the organization ’s own logged-in users and resources, however, those combined, weaving computer systems operate in some way with each other in order to share the general money for the organization ’s logins. The degree to which important user-level controls are issued to or shared with other organizations. However, privacy laws require some organizations to allow users to control Personally identifiable information, and who it is distributed to. As users know the more ways private information can be abused, the need for more privacy / deregulation increases. Therefore, in a joint environment Provides a user-level control method for the storage, management, and circulation of user attributes, while simultaneously removing user inconvenience and / or information between joint organizations It would be advantageous to reduce to a minimum. [Summary of the Invention] The present invention proposes a method, device, system, or electronic product to help user attributes information of one or more attribute information providers. : \ 89 \ 89077.〇〇ς -10- 1246005 s. The property information provider can rely on the user's choice, the user's choice or management decision, and the options (including the Mb day and day stored in the property release county). 『People come to A and / or are sadly at the same person = determined: option) management-user attribute information. Any Maozi business service provider that uses this needs user attribute information to complete 'and not Must have been with that particular E-commerce service provider establishes a relationship.: E-commerce service provider (eg-online banking or online business voice = poor news provider maintains-relationship), so that the e-commerce service provider can be represented by the attribute information provider The user provided by the user = sex tribute.-The e-commerce service provider allows—or multiple attribute information & the specifications of the supplier are retrieved by the e-commerce service provider—the user's user attribute information. The e-commerce service provider may receive the specification of an attribute information provider together with, for example, a request for access to one or two, in the form of a super-transport protocol (TPP) C00kie data. If the e-commerce service provider uses the One of the attribute information providers has a relationship, so when an e-commerce service provider needs a user = sex message to complete a transaction for that user, the user will be able to guide the e-commerce service provider to an attribute Information provider. The user attribute information is used by the e-commerce service provider to perform a user specific operation related to the requested resource, for example, to decide whether the user should be allowed access to the resource or for personal use. E-commerce service providers may retrieve user attributes from multi-attribute information providers that have been specified in a sequential manner. [Embodiment]

O: \ 89 \ 89077.DOC -11-1246005 Generally, it may contain or fly by day and day, and the devices related to Fengming include various data processing technologies. Therefore, as a background of the present invention, before explaining the present invention in more detail, a typical organization of hardware and software components in a decentralized data processing system is described. Referring now to the drawings, FIG. 1A illustrates an n-network of a data processing system, each of which can implement the present invention. The distributed data processing system includes network 101, which is a medium that can be used to provide communication keys between various devices and computers connected together in the distributed data processing system 100. Network 101 may include a permanent connection ’such as an electrical gauge or fiber optic I line, or

Phone or wireless communication for a temporary car. + a u 1 A D π f inch connection. In the example described, the server 102 and the feeder 103 are connected to the network 连同 along with the storage unit 104. In addition, clients 105-107 are also connected to network 101. The user terminal 105 refers to the feeding server ϋΗ) 2_1 () 3 may be represented by various computing devices, such as a mainframe, a personal computer, a personal digital assistant (PDAS), and the like. The distributed data processing system 100 may include additional servers, clients, routers, other devices, and a peer-to-peer architecture not shown. In the example described, the decentralized data processing system 100 may include the Internet, Kushiro α,,.... [Ding cp / ip], Hypertext Transfer Protocol [HTTP], etc.) A global collection of networks and channels that communicate with each other. Of course, the decentralized data processing system 100 may also include many different “members,” Kushiro, for example, such as an enterprise network 'a local area network (LAN) or wide area network (WAN). For example, the server 102 directly supports the client 109 and the network u 0 combined with the wireless communication link. Available net

O: \ 89 \ 89077 DOC -12- 1246005 phone 111 is connected to network 110 via wireless link 112, and pda 113 is connected to network 110 via wireless link 114. The phones 111 and pda 11 3 can also use a suitable technology to pass data directly between them through the wireless link Π 5. Suitable technologies such as 311 ^ 丨 〇〇 let 1 ^ wireless technology to establish the so-called personal area Network or personal specific network. In a similar manner, the PDA 113 can transfer data to the pda 107 via the wireless communication link 116. The present invention can be implemented on various hardware platforms and software environments. Figure A is intended to be an example of different computing environments, rather than an architectural limitation of the present invention. Referring now to FIG. 1B, a typical computer architecture of a data processing system (such as shown in FIG. 1A in which the present invention can be implemented) is illustrated. The data processing system 12 includes one or more central processing units (CPUs) 122 connected to an internal system bus 123. The internal system bus 123 interconnects a random access memory (RAM) 124, a read-only memory 120, and Input / output connector 128 (which supports various input / output devices such as printer 130, disk unit 132, or other devices not shown, such as an audio output system, etc.). The system bus 123 is also connected to the communication connector 134, providing access to the communication link 136. The interface connector 148 is connected to various user devices, such as a keyboard and other devices not shown, such as a touch screen, a pointing pen, a microphone, etc. The display connector 144 connects the system bus 123 to the display device 146. ^ One skilled person will find that the hardware in Figure 1B may change due to system implementation. For example, the system may have-or multiple processors, such as Intel®

PentlUm (§) -based processor and a digital signal processor (DSP), and a

O: \ 89 \ 89077.DOC 1246005 or more types of volatile and non-volatile x-dagger recesses. In addition to the hardware depicted in Figure 1Bt, other peripherals may be used, which Li Qiong chooses instead or instead. The described consumption examples are not intended to imply architectural limitations that are not related to the present invention. In addition to the κ yoke on various hardware platforms it, the present invention can be implemented in various software environments. -A typical operating system may be used to control the execution of programs in each lean processing system. For example, one device may run a Unix (R) operating system, while another-the device contains-a simple w execution environment. -A typical computer platform may include a browser, which is a well-known software application used to access various formats beyond the text of this article. Hypertext documents such as graphics slots, word processing audits, eXtensible Markup Language (XML), Hypertext Markup Language (MMA), Handheld Device Markup Language (HDML), Wireless Markup Language (WML), and various other formats and Type of slot case. It should also be noted that the decentralized data processing system shown in Figure 1A is considered to be able to fully support various point-to-point subnetworks and point-to-point services. Referring now to FIG. 1C, a network diagram illustrates a more specific, but common, web-based environment in which the present invention can be implemented. In this environment, users on browsers 1 52 of client 1 50 want to access web application server 154 in domain name server (DNS) domain 156 or DNS domain 1 60 Web application server} 5 8 Previous protected resource. A protected resource (an application, object, document, page, file, executable code, or other computing resource, communication type resource, etc.) is only available if the requesting user knows that Liu Lantai is tolerated and authorized by § A resource accessed or retrieved. Each DNS domain can have an associated authentication server 162 and 164. Generally, once the user is authenticated by the authentication server, a cookie data can be set and stored in a cookle data cache in O: \ 89 \ 89077 DOC -14- 1246005. The requesting client can make an intra-domain request or an inter-domain request for the protected source. Requests within a domain 仏 Yin Yinyuan is located on the same server that executes 3 forbearance. An inter-domain request indicates that the target resource is located in the same Internet domain, but on a server different from the authentication server that created the 5 forensics. A cross-domain request indicates that the user wants to access a protected resource outside the DNS domain that the user is currently using. Referring now to FIG. 1D, a data flow diagram illustrates a conventional technical procedure that may be used when a client attempts to access a protected resource. As illustrated, the user at the client workstation 170 attempts to access a protected resource on a server 171 on a computer network through a user's web browser running on the client workstation. As mentioned above, a protected resource is identified by a universal resource locator (URL), or more generally, a resource identifier (URI) that identifies resources that can only be accessed by an authenticated and authorized user . The computer network may be the Internet, intranet, or other network as shown in Figure VIII or Figure ,, and the server may be—web application server (WAS), server application , Server-side applet process, or similar. When the user requests a protected resource, such as a web page in the domain " ibm com, f, the process starts (step 172). A web browser (or a related application or application-side applet) generates an HTTP request message (step 173) to a host server domain ("CD⑻"). The server determines that it does not have a valid conversation To the client (step i74), so the server asks the user to perform an authentication process by sending a certain type of authentication challenge to the client

O: \ 89 \ 89077 DOC -15-1246005 (step 175). Authentication challenges can be in various formats, such as ... Markup Language (HTML). After that, the information (step 176), such as', is used for: requested or required ^ For example, a user identifier and a client can automatically return some information. The message, code, or authentication response is sent to the server (step m), and the user or client is authenticated (step m). As an example, the login information sent by Caisuier 2 is compared with the proposed authentication information and ‘: =: Poor authentication. Assuming the authentication is successful, a valid conversation is made with the authenticated user or 2 =. The feeder then retrieves the requested web page and sends it out-Ηττρ% response is sent to the client (step m). At this time, the user may be in Liu Lan; when; by clicking on-Hypertext link request "lbm e⑽ ,, among the other-web page (step)), the browser sends another _ Ηττρ request to the server ( Step: :). At this point, the server determines that the user has a valid conversation (step 182), and the server returns & the requested web page to the client in another HTTP response message (step 1 8 3 steps). Although Figure 1D describes a typical technical process, it should be noted that other possible conversation state management techniques may be described, such as using data to identify users who have effective parent talks, which may include the use of The same co0kie information that provides authentication evidence. Figures 1C and iD focus on user authentication operations. In general, after a user has been authenticated in a domain, it may assume that the domain provides user authentication. Access to various resources. Although the authentication process only establishes the identity of a user, in some domains, the identity of a user may be

O: \ 89 \ 89077 D0C -16- 1246005 Provide sufficient information in the judgment of access to Beiyuan. In these domains, I can provide access to resources for all authenticated users. However, in the exchange domain, when —user requests —resources, the I = processor in the —domain may require additional information about the person, that is, the user attribute, before performing an action on behalf of the user. . Generally, the user's knife is used to obtain the usability previously associated with the user. Weeped 1 ° in resource management.彳 After serving the necessary user attributes, resource management = provide resources to users after the user attributes retrieved in some way (for example, ‘operate with -personalization or -authorize operation) 2 In an enterprise domain = domain, it is managed in the user attribute area of a typical service provider ... The body may usually be called an attribute information manager (enough. A. Various resource managers can be in the-domain or in different domains) Operation, and = the resource manager may require user attributes for a specific purpose. For example, a server may require user attributes in order to determine whether a user has access to Special δ characteristics. If the material has the necessary rights attributes, = the push feeder is provided to provide resources to the user. In another-example,-within :: :: may "require user attributes in some ways Personalized return to the user Γ inner valley. The content feeder may be rooted for user sales or other purposes = user attribute 'for example, gender, limit or modify it for the user ^ see in Figure 2, a box The figure depicts an example of a blood group online parent that requires user attributes. Figure 2 illustrates that when accessing multiple domains, one user can ask the user to provide user information Tflb—some difficulties. Reference again

O: \ 89 \ 89077.DOC -17- 1246005 Figure ic and Figure 1D, a user may need to complete-authentication before obtaining access to a controlled resource, as shown in Figure 1D. Although not shown in the figure, the 'attribute information manager' may be configured on the server 171 to manage user attributes required for judging an access control. As shown in Figure π,-users may have multiple current conversations in different domains 156 and 160, and although they are not shown in the figure, each-domain may use-attribute information manager. In a similar way, Figure 2 also describes—group domains, each domain may support some type of attribute information manager. The user 200 may be registered in the domain 202, which may support the attribute information manager 204 for managing the user attributes of the user 200. Domain 200 may be an Internet service provider (Isp) that provides Internet connection services, e-mail services, and may provide e-commerce services. Alternatively, the domain 200 may be an Internet portal frequently accessed by users 200. The domain 202 may store a wide range of user attributes for the user 200, including personal, financial, and administrative attributes, which may include content preferences. The government domain 206 supports an attribute information manager 208 that manages various government-related attributes of the user 200. The banking domain 2 10 supports an attribute information manager 212 that manages various attributes of a bank. E-commerce domain 2 丨 4 also supports attribute information manager 2 1 6. Each of the above domains may use some form of storage operated by the user 200 on the client 22 to perform certain operations on behalf of the client 22. For example, if the user 200 is using a browser application 222 to access an application supported by a domain, the domain may set an HTTP cookle data in the cokie data cache 224. If the user 2000 is O: \ 89 \ 89077 DOC -18- χ246〇05 using some other application protocol (SOAP) client 226 the material storage 228 may be used as, for example, combined with playing simple object access One of these applications is the regional client-side storage. As always, 'When a dezez user uses a resource accessed in a different domain to try to move from the -domain to another one in the Internet, or the World Wide Web: a domain' The user may encounter multiple user information requests or requests, which can greatly slow down the user's progress across a small 5 heart group domain. Allowing a user to encounter multiple neighbors in a short period of time. The demand or requirement of $ Λby Ming may greatly affect the user's ability to complete transactions efficiently. Using FIG. 2 as an example environment, the user 200 may participate in an e-commerce domain 214—a complex online transaction, in which the user is trying to buy restricted to at least 18 years old, and has a valid driving license,-valid credit + , And—The online service for users of U.S. bank accounts. Although the user 200 should be able to provide all necessary user attribute information to the domain 214 ', it takes time and patience to enter information, especially when the user 200 has been stored in other domains because of all this user attribute information Disappointed with the facts somewhere. For example, the user 200 may have previously visited the e-commerce domain 214 and purchased a different online service. During the previous transaction, the user 200 may only need to provide a credit card number, but the user 200 may or may not allow the domain 214 to store a user profile managed by the property information manager 216 in the credit card number. However, if the user 200 does not need to provide any other user attribute information for the previous transaction, the domain 2 14 will not be able to access the user attribute information required for the current transaction. User's bank account in attribute information manager 212 of domain 210

O: \ 89 \ 89077 D0C -19- 1246005 Asset A If the use of a card transaction is rejected, the domain 2 2 4 may require a bank account Gongxun as a source of prepayment. Attribute information management in government domain 206 °° 8 has driver's license information, but either domain 2 06 or domain 2 1 0 is not a branch used to transfer user attribute information to domain 2 1 4 mechanism. Before user 200 receives the desired online service, the user must find a way to communicate all this user attribute information to domain 2 in a secure and authenticated manner. In the case of the Global Poor Network, users are beginning to look forward to using an application on one Internet domain to another domain in a way that is least relevant to those information barriers between each specific domain The monthly force of another app for interaction. Users do not want the failure caused by the situation shown in Figure 2, especially if the user knows which domains have been joined in a federated environment in a certain way, and the user expects that the organization in a federated environment should Interoperate at a higher level than unattended domains. Also, users often want domains to value their privacy. In addition, producers may want to restrict the domains where their private information is stored for a long time, thereby limiting the effects of unauthorized disclosure of personal information, for example, after a security breached domain. User preferences may change depending on the nature of the domain or the nature of the information used by the domain. Because of the foregoing current technology and some of its related issues, the remaining illustrations are related to the computer environment in which the present invention is operable, continuous cropping. However, before f discusses the invention in detail, some terms are introduced. -A typical network-connected computing environment can outline the service provider. One service sister i 3 user, spearhead k donor via computer system and internet

O: \ 89 \ 89077.DOC -20- 1246005 μ) electronically deliver some form of information, access to resources to a user. — Sub-fetch, or business-consumer. In general, many different service providers who are currently providing services ψ @ W, I may appear in a specific network environment, such as the borders of the main broadcaster. Online store representative-a class of e-commerce service providers, 1 server Di Danjia + M eight mouths represent a class of poor flood service private providers. The Internet service b h, 疋 楗, 疋 楗, 疋 楗, 罔, and 罔 communication links serve as an entity for the Internet. A business contract can be considered a business entity ^^ such as a company that operates a service provider. Although not intended to be limited in the interpretation of the present invention, a service may be considered as a limited function or a limited set of functions; the service may be used by a user, enterprise, or other entity, or the product of the service may be delivered to use Ceased business, or other entities. — The service provider may make a particular service available after various circumstances: after conclusion of a financial or contractual agreement4, after accepting only a simple request, or after some other type of exchange. For example, some websites restrict access to valuable information, 'alpha pays attention to each other', while other websites operate by inserting ads into the content at the same time by making the content free of charge . With regard to the present invention, a service provider may be considered a data processing system and communication facility that electronically delivers or makes a particular type of function available. In Bali juice ^% 纟 兄 1ί7, companies communicate with each other by complying with communication protocols and other types of standards, but these companies do not necessarily agree to provide a common way to serve them. Generally, an enterprise has its own user login and / or maintains its own set of users; each enterprise usually has its own method of authenticating its users. In addition, each business usually has its own

O: \ 89 \ 89077.DOC -21-1246005 It is impossible to manage the user attribute information, as described above with reference to Figure 2. The nature of these enterprises causes the above-mentioned information barriers in typical computing environments. For example, the typical computing environment is the opposite, and the federated computing environment has the additional feature of allowing businesses to operate with each other in order to provide functions in some common ways. In the case of ‘-typical alliances, business alliances are allowed to work together collectively through trust in delivery. Referring to FIG. 3, a block diagram depicts a set of entities that can be established—typically, a hand-off relationship. If the user 3G2 and the enterprise 3Q6 have a trust relationship 304 'and the enterprise 3G6 and the enterprise 31 () have a trust relationship fan, then the user may, according to the trust claim 312, represent the user 302 and Enterprise 310 interaction. Parental trust relationships can be used for oral purposes, such as the transfer of authentication information, attribute information, or other types of information. Certification is the process of confirming a set of qualifications provided by or on behalf of a user. Authentication is accomplished through a challenge / response operation using various authentication protocols, by verifying something a user knows, something a user owns, or some characteristics about the user. For example, verification of a user's knowledge of something may be accomplished through a shared secret, such as a user password illustrated in Figure 1D, or through something that is known only to a specific user, such as a user-added key . Verification of something owned by a user may use a smart card or some other form of hardware token. Verification of a user's characteristics may use a biological input, such as a fingerprint or retinal image. As a by-product of the certification operation

O: \ 89 \ 89077 DOC -22-1246005 β is passed between vapors as a form of identity evidence. A certification token 2 provides direct evidence of a successful certification operation and is generated by the entity performing the certification operation. -A Kerberos token is an example of an authentication token that can be used in the present invention. More information about Kerb⑽ can be found in the Internet Engineering Task Force (IETF) _Technical Document (RFC) 15i〇 K〇hi et al. &Quot; The Kerberos Network Authenticat 10n SerV1ce (V5) " ta in September 1993. In a -trust relationship, two entities in a 'relationship are trustworthy in a communication. A claim from another entity is true. An assertion provides indirect evidence of certain previous actions; for example, an assertion may provide indirect evidence of prior decisions or operations regarding identity, authentication, attributes, authorization decisions, and / or other types of information ... Security Assertion Markup Language (SAML The claim is an example of a ± sheet format that can be used in a joint environment. The eight papers have been published by a non-profit, global association, a structured information standards promotion organization (⑴asis). SAML is described in the Commission Specification, May 31, 2002.

Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) ’is as follows: The Security Assertion Markup Language (SAML) is an XML-based structure for exchanging security information. This security information is in the form of claims about subjects, and a subject is a coherent entity (either a person or a computer) in some security domain. A typical example of a subject is a person identified by his or her email address in a particular Internet DNS domain. Claims can be made about the authentication actions performed by the subject, the attributes of the subject, and the authorization decision as to whether or not the subject is allowed to access certain resources. O: \ 89 \ 89077.DOC -23- 1246005 The poor news. Claims are expressed as XML concepts and have a nested structure, while a single claim may contain some different internal statements about authentication, authorization, and attributes. It should be noted that claims containing certification statements only describe actions of previously occurring certifications. The claims are issued by SAML authorities, that is, certification authorities, attribute authorities, and policy decision points. SAML defines a protocol by which clients can request assertions from their SAML authorities and obtain a response from them. The co-founders agreed that XML-based V * Xinyakou-Industry, Factory / |, 2 'can be restricted to many different basic communication and transmission protocols; SAML currently defines a restriction on SOAP on Ηττρ. SAML authorities can use various sources of information in establishing their response, such as external policy stores, and claims received as input in requests. Therefore, although the client always consumes the claim, the SAMLt bureau can be the producer and consumer of the claim. When necessary, various claims can be transformed into other main secrets. The difference between a certification qualification and a certification claim is that the certification claim is made by a user as part of a certification agreement procedure for a certified feeder or service, and the certification claim is related to the successful submission and certification of a user's certification claim and A confirmed statement, which can then be passed between entities if necessary. Through the delivery-type trust relationship, users in a special company waiting to join a company through that special company join a company. Multiple people ... Groups of other companies move: The users of the heavy industry can interact with those companies in a -common way. Β θ common methods and interfaces reduce user frustration and increase user productivity. For example, ^ ^, Niu 1 J Shu 5 Xiong, the management of greed can be implemented in an iterative manner, so that users can be allowed to access any of the joint ventures-enterprises, Beiyuan, as if they were eight ^ Zhi Cong has a direct relationship

〇 \ 89 \ 89077 DOC -24- 1246005. As another example, that is to provide users from different enterprises with different sources of resources, and different types of resources can be used in a common way to personalize users. Referring now to FIG. 4, one party changes F1 P, +, and Ghosts. He describes a typical joint computing environment. The Yu-federated computing environment is a type of computing environment, and the federated computing environment can also be roughly described as including users and service providers. The alliance paste contains multiple service providers. It helps to describe the “encouraging transactions in a combined environment” and distinguishes various types of service providers. In the following examples, _ specific types of service providers are mainly used: an e-commerce service Provider Qing P). An e-commerce service provider is equivalent to: a commercial entity with an affiliate; for this purpose, it should be understood that the e-commerce service provider described in the following examples may provide access to users—services, or provide resources to any entity that supports access , Which may include electronic «entities' like banks and online stores but may also include information providers or other content or service providers. Service providers in the Alliance 400 support various functional capabilities. ECSP410 supports the authentication manager 412 to verify the identity of the user who has been registered as # ECSP41 () as instructed by the user registration database 4U. Εαρ · also supports the attribute information manager 416, which manages the user attribute information stored in the user attribute information = library 4㈣, representing the silk user of Ecsp41Q. The ECSP410 also saves the transaction history database 々ip. In a typical computing environment, the service provider determines the user attribute information of the user in order to provide certain types of services for a particular carrier. As described above with reference to FIG. 2 '-Service Provider Inquiry-User to obtain the required user attribute information, the service provider can store it later or store it without using \ 89 \ 89077 D〇c -25- 1246005 The same attributes apply to a joint computing environment; in other words, a service provider in the _ Shenren ^% environment may or may not require user attribute resources, σ, and A service provider in a joint environment may or may not have user attribute information in P & s. Contrary to ECSP 410, ECSP 420 supports sarcasm ~~ § 422 and its user registration database 424, but does not support a subordinate, negative manager. Therefore, ECSP 420 is able to respond to users with restricted access or individualized access to poor sources based on—user authenticated identity (but not based on user attribute information). As an example of a more limited service provider, ECSP43Q does not support-the authentication manager does not support an attribute information manager, but Cong 440 is similar to ECSP 420 'and supports authentication manager 442 and its user registration database结构。 Structure. In a typical computing environment, a user may log in more than one service provider or federated domain in a federated computing ring & S. For example, a user may log in through the user ’s employer, the user ’s ISP, or some other service provider. Registration is the operation of a user providing identity information to a domain in order to establish a permanent relationship with the domain; thereafter, the domain identifies the user through some form of authentication. In FIG. 4, a user may log in to any domain 'capable of logging in to the user', such as ECSP 410, ECSP 420, or ECSP 440. The characteristics of a federated computing environment may include that one of the federated domains registered with a user may be considered to be the same as the primary domain of the user in the federated computing environment. Any federated domain that can authenticate a particular user can be called the user's primary domain. It is possible that there may be multiple enterprises in a federated environment that can act as the primary domain of a user, because there may be multiple enterprises having

O: \ 89 \ 89077 DOC -26- 1246005 The ability to generate and validate certification for a user. However, in the context of a specific joint conversation, 'there is usually only—the domain is considered the user's primary domain. As shown in FIG. 4, since a joint domain registered by a specific user does not necessarily store user attribute information, the user's main domain may or may not save the user's user attribute information. In other words, a main domain may be enough to authenticate a user, but it does not necessarily store any personal or general information about users other than those required to authenticate the user. A primary domain may or may not contain any additional functionality to assert its status as a primary domain of a user compared to other domains; in other words, the primary domain of a user may differ Be formal or informal. As an example of a formal distinction, a user may gain Internet access from a federated Up domain, and thereafter, the Isp domain may act as the user ’s master by providing authentication to other federated domains Domain. As an example of two informal differences, a user may often access a web portal that the user uses to receive information and conduct online transactions, which is considered a primary location. In any case, the domain that the user considers to be the starting position of the transaction for the majority of users in the affiliate may be considered by the user as the user ’s primary domain. Or, the 'confederation may formally designate a primary domain for a particular login. … Beyond that… a federated domain may be considered the user ’s primary domain for a specific purpose. Because ... users may have specialised primary domains that can work together during certain joint conversations. For example, a domain syndication conversation may be done by providing a representative—❹ 者 =

O: \ 89 \ 89077.DOC -27- 1246005 is the proof of the identity of the user.) It plays the role of the joint transaction period n ° heart °, and the domain; and during the same period, a financial service provider By providing 服 卜 目 a ^ Using card company may serve reciprocating = fund play-financial main domain. The establishment of trust relationships between service providers and donors can take place in a full pipeline process, where b is to be passed through a special safety cylinder 4 Μ ^ milk ^ 1. There are various types of responsibilities related to the responsibility of each party. Legal agreement. , 者 和 一 服 烟 趄 I Tu Yingzi thinks about the use of a program, although the establishment of the Π relationship may be equivalent to -login: ^ mei Xu may only be the larger part of the establishment-trust relationship ... It should also be noted that one The login procedure may be complete or only ^ 疋 笔 笔. For example, 'a bureau sends a written or electronic document to a service provider', "you should be the right place to serve the provider, in order to establish identity or be liable to establish certain information legally. A part of the login procedure can be completed in a comparable procedure completed by the login procedure. 4 births-special security tube ▲ Now from the description of a typical joint environment to support the present invention-the better joint Computational loop Qi, Jane ^ ^ In the meantime, a better joint computing environment ^ helps to maintain users' secrets in one or more locations in the-joint environment, and also helps from the entire joint environment One of those locations then uses the user's attribute information. From one perspective, this effort may be described as a decentralized attribute information store. Needs—user attributes Poor service providers can identify these attributes One of the storage locations then retrieves the user's attribute information when needed. In a federated environment in which the present invention operates, a user can associate with one or more attribute information providers (AIPs) . Equivalent by information providers on behalf of special

O: \ 89 \ 89077.DOC -28- 1246005 An entity that stores, manages, and retrieves attributes for other service providers. Therefore, the -attribute information provider is a specialized service 2 that manages user attributes in itself as a unique service. However, it should be noted that the role of the attribute information provider and some other types of service and service providers can be implemented in different entities or implemented in the same entity. A user can establish and maintain a relationship with one or more attribute information providers, so that an attribute information provider can provide the user's attribute information to other service providers in the federated environment when needed. Just = serve one. Other service providers, such as online banks or online merchants, also maintain a trust relationship with an attribute information provider so that the other service provider can trust the attribute information of the user provided by the attribute information provider on behalf of the user . Referring now to FIG. 5, a block diagram depicts a preferred integrated environment in which the present invention may be implemented. It includes multiple users and multiple services. Linked: The user is represented by the user 502 'It's through — client-side settings (not shown) Use the internal or external services of the joint computing ring in a manner similar to that described in Figure 1A · 3 Provider interaction. A typical federated service provider is served by the e-commerce service provider in Figure 5: mention = similar to the way described above with reference to Figure 4, these e-commerce = providers ⑽_ through the authentication manager (am) Related to it: In addition to the six people, including both New Zealand and non-United producers, these e-commerce service providers may use the attribute manager (ΑΙΜ) and its related database Include, including management use

O: \ 89 \ 89077.DOC -29- 1246005

The ability to attribute information. In the example shown in Figure 5, ECSP 510 contains AM 5 12 and ECSP 520 contains AM 5 22; therefore, these e-commerce service providers do not manage user attribute information. ECSP 530 contains neither a certification manager nor an attribute information manager. In contrast, ECSP540 includes AM 542 and AIM 544, and ECSP 550 includes AM 5 52 and AIM 5 54, so these e-commerce service providers can perform authentication operations and manage user attribute information of users, regardless of whether those users are Think of it as a federated or non-federated user. ECSPs 510 '520, 530, 540, and 550 are shown in Figure 5 as participating in Alliance 500 because they share certain types of common functionality based on previously established trust relationships. Although all and every-e-commerce service providers do not necessarily have a trust relationship with every-other e-commerce service providers, those e-commerce service providers have structures or networks that guarantee the trust relationships in their alliances. _'ECSP 56〇 contains am 562 and Na 564 in order to be able to perform authentication operations and manage user attribute information 'but ECSP 560 is not included in the alliance 500, because it and any other of the alliance None of the service providers have any previously established trust relationships. In the example in FIG. 5, the use of 5G2 is not included in the alliance 500 because the user 502 and the alliance 500 have at least a trust relationship, although the user is lacking ~ service k Donor has service provider interaction. The user 5G2 may work with federated and non-federated services ... a joint computing environment and a affiliated person who can configure the present invention. In the difference between the different contexts, it is obvious that a group of attribute information providers ′, 幻 园 5 and 看 疋 are obvious. As above

O: \ 89 \ 89077.DOC -30- 1246005 mentions that-users can contract with one or more attribute information providers in a-federated environment, and those attribute information providers (AIPs) manage their use in themselves This attribute is considered as another service, although this service may be provided by a single enterprise together with other services. Compared with the alliance in Figure 4, the alliance 5GG in Figure $ contains the attribute information provider as an individual service provider. In particular, the AIP 570 contains an AM and an attribute management unit (amu) 574. -The attribute management unit includes any supporting database, such as a user registration database (not shown), and it is similar to the attribute information manager supported by a federated e-commerce service provider, but an attribute management unit also includes additional Functionality to perform the operation of the invention as described in further detail below. % Pang 500 also includes AIP 580, which supports AM 582 and AMU 584 in a manner similar to AIp 57〇. In the example shown in FIG. 5, the user 502 is a registered user of Alp 580, as reflected by the inclusion of information on the user 502 in the user registration database 586 managed by AIp. The establishment of a trust relationship between an attribute information provider and a user will mainly be a special feature of the attribute information provider that the user uses to store, maintain, and distribute the user's attribute information. Security pipeline program. In k targets, user 502 has previously contracted with Aιρ to establish a trust relationship with AW 580, so that AIp58〇 can provide user attribute information to other service providers on behalf of user 502. Similarly, Aip do n’t support AM 592 and AMU 594 ’, which manages user attribute information of user 502, as reflected in user registration in user registration database 596. The user may contract with the attribute information provider in different situations.

O: \ 89 \ 89077.DOC -31-1246005 2. For example, the distribution of certain attribute information by a user may require clear user consent, while in other cases, the user may allow distribution of attributes without user intervention. These preferences may change due to the identity of the e-commerce service provider who is requesting the attribute of the user. 2-The attribute information provider may maintain in the attribute information provider—the database contains the value of the user attribute. Relevantly store these usage preferences as -attribute issuance policies. Therefore, when a user logs in to the attribute server, or when a user updates the user ’s affiliation and sexual information, an attribute = information provider may selectively respond to —users ’— interfaces, and attribute distribution policies. Japan-E-commerce service provider may have previously established at least one provider = and may have multiple rules: # 信 Provider-establish a trust relationship, or 2 is a special security pipeline program. An e-commerce service provides a contract for attribute information services regardless of the level. It should be understood that the various potential attribute propagation methods of the present invention work together. As part of the process of establishing a trust relationship-part of the 'e-commerce service provider and attribute information ^ = will: and: to establish-a special security channel of trust information :, # 可 旎 include-shared secret key, Digital proof, or some other form of information. This information is used-proposed by the attribute information provider one or two-attribute information during user transactions. The user of each service provider of the e-commerce is shown in the example of Fig. 5, which enables the information provider to establish-trust "the economy and pluralism · may be regarded as-the user pair, the description"-the joint service provider Official user-specific purpose primary domain; in other words,

O: \ 89 \ 89077 DOC -32- 1246005 A user may have simultaneous specializations during a specific joint conversation (that is, one or more transactions or operating user conversations in a joint computing environment) Domain. If the user is already registered with multiple attribute information providers, then one of those attribute information providers will be considered as the attribute primary domain of the user for a particular federated conversation. At the same time, another service provider who is providing authentication claims on behalf of the user during the same conversation may be considered the user's authentication primary domain for that conversation. The identification of these different primary domains may be officially supported in the alliance, although the following examples use these terms more like to help describe the process of the invention with reference to the remaining diagrams below, among many service providers or domains Naming conventions for the operations that take place. Referring now to FIG. 6 ', a flowchart describes a procedure by which an e-commerce service provider attempts to retrieve from an attribute information provider (attempting to access the attributes of the e-commerce service provider-of a resource) -user Information. Figure 6 illustrates a process that is initiated when a user requests access to a resource. Afterwards, an e-commerce service provider decides that it needs user attribute information, which may be for an access control judgment, for -content personalized operation, or for some other user-specific operations. Mind Business Services ^ ^ A method to verify the user or obtain the identity of the user, for example, a display-program. First, as shown in Figure 10, in order to perform user-specific operations, φ requires the user's attribute information. The e-commerce service provider does not need to prompt the use of attribute information, and the e-commerce service provider uses it. E-commerce service provider

O: \ 89 \ 89077.DOC -33- I246〇〇5 t ... Direct access to a user is possible storage and maintenance-I can not directly access the device, such as the dedicated or proprietary The data sent to the user by the property information management service provider hopes to reduce the number of Bei Xun # requests to a minimum. Instead, the use + provider in accordance with the present invention attempts to replace the subdomain business services from the; ^ sub-business service -user = return user attribute information. According to the present invention, one of the sex information providers. Operation—The program that leads to many possible maps = started by an e-commerce service provider from a user receiving a request from a source, electronically ^ ^ ^ ^ ^ ^ Zibo Yi a service provider User-specific operations are required for this request (step 6G2). As mentioned above, the operation of 疋 may include the authorization of the content, and the "solidified operation, judgment of access control, that is, judgment of U ~ other types of operations. The following example describes the access control f ', but it should be understood that the present invention can be applied to the area where a user's home address including a U-page corresponding to a user can be individually converted into a light-weight portion of a user. Weather report. This step may only be required for those situations where additional attributes are required; those sub-business service providers do not need such information, for example, only non-individual web pages. Then, whether the e-commerce service provider already has the attributes of the user (M _ ^ _ previous transaction cache storage)-Step P should also be noted that the method of the present invention can be combined with other processing.

O: \ 89 \ 89077 DOC -34- 1246005 2 Attribute method—implemented, and the operation month for different attribute storage methods> 3 is sufficient in some way (requires user attribute storage from different locations or services for user attributes) Multiple checks) merge, which can be incorporated in the first step. For example, Telegram: Business service providers may maintain user attribute storage for certain customers who have allowed e-commerce service providers Ugurenbei to replace and / or use an attribute information provider. If the e-commerce service provider does not have user attribute information, the e-commerce service provider determines whether it owns or can retrieve the user's one or two domain identity tokens (step _). _ Stunt user's AIP domain name. It will already contain the information of the 4 types (of the user attribute information of the specific user). Therefore, the e-commerce service provided this user ’s domain identity of Α1ρ, because it may have been received from the user browser in the form of HTTPc (K) kief data, which is a relevant HTTP request. Yiqiu Tian ... time hurt. Or, the e-commerce service provider lacks the storage of raw materials (for example, _feeder-end user login database) to take the identity of the specified domain. This implies that the e-commerce service provider has just authenticated the user's identity as a user. = The e-commerce service provider judges that it has a user-invited domain, then the e-commerce service provider records the identity of the second-ranking supplier from the A-domain identity (step 608), and generates the indicated affiliation; : Mention: the -attribute acquisition request message (p. 61. step). Attribute fetching Ming Ming asks for information from all user attributes. This group uses a group retrieved by 2 providers. To complete the response from the user, it may be the Γ business service provider.

〇 \ 89 \ 89077 DOC -35- 1246005 All or a user attribute is not ° and a group of e-commerce service providers who only request from an attribute information provider decides to make the request broken. The e-commerce service provider may choose the provider From the multiple Γ-attribute information providers, a subset of the attributes of e-commerce services. Each request from the poor provider is a user two: = = = ΓΤΡ redirects to a user. " Ask for the appropriate attribute information provider ° Application program to provide the functionality of e-commerce service providers: Event queue implementation 'so that messages can be sent asynchronously and connected to the library 2 attribute acquisition request message After that, the application will not have to wait for the corresponding attribute to be retrieved from the oral response, because the application can perform other actions here. ’If there is a situation described with reference to steps 602-612, anyone can understand the effect of operating in ^ i §. Although the e-commerce service provider does not yet have user attribute information, it is likely that the user is starting a new conversation with the e-commerce service provider, but the e-commerce service provider may try The feed provider gets the user's attributes ^ news. Since an AIP registration process has been used with the e-commerce service provider to establish the user ’s attribute information provider identity in some way through the use of the unchanged AIP domain identity token, the user has not been asked directly during this particular conversation Provide the identity of the attribute information provider to the e-commerce service provider. The example of the present invention shown in the figure uses HTTP redirection via the user's browser in an entity (such as an attribute information provider and a request O: \ 89 \ 89077.DOC -36- 1246005 7 e-commerce service provision Information). It should be noted, however, that the present invention can operate on various communication protocols' and is not meant to be limited to Ηττρ 通 k. Moreover, those entities may communicate directly when necessary; messages do not need to be redirected through the user's browser. Continuing this example, at some point, the e-commerce service provider uses HTTP redirection to receive the attribute fetch response message from the attribute information provider via the user's server (step 614). The e-commerce service provider unpacks the attribute retrieval response message (step 616) and checks it to determine whether the attribute retrieval operation was successfully completed (step 618). If so, then the e-commerce service provider retrieves an access control list (step 62) and starts the access control judgment operation (step 622). A judgment is made as to whether the user is authorized (step 624), and if the result of the access control judgment is affirmative, that is, the user is authorized, then the e-commerce service provider provides Section 626㈣) and the procedure is complete. If the attribute acquisition operation is not successfully completed at 018th, then the e-commerce service provider denies access to the protected resource (step 628), and the process is fully completed. It should be noted that, in some cases, an e-commerce service provider or a Wang Qibei-type domain may have direct access to an attribute information manager that can provide the user's attribute information. For example, a 'domain' might hold user attribute information for many users in server-side storage. Referring to step 604 again, if the emperor ^ I sub-business service provider already has the user's attribute data, then the sequence branches to step 622, where the e-commerce service provider J performs access control judgment. This situation may also occur (for example

O: \ 89 \ 89077 DOC -37- 1246005 said that when using "P ^ has ,,,, or accessed the same or in the e-commerce service provider ____ 丨 — ^ / X controlled resources) The e-commerce service provider may have decided to store the user ’s attribute information. It should also be noted that FIG. 6 describes the use of a single attribute information provider. However, the structure of ㈣ may be implemented to support the use of the attributes described by the user. ^ Attribute poor information provider 'as described below with reference to FIG. Detailed description. Figure 6. Brother-how can users try to access the-e-commerce service provider's-tone, tap line, and how the e-commerce service provider may need user attribute information to perform-user-specific operations. Referring to step 606 again, the e-commerce service provider determines whether it has a consistent AIP two-domain identity token for the user. The identity token of the ΑΙρ domain is included in the attributes of the e-subscriber from the e-commerce: service, provider-request. After the request, the identity of the user can be retrieved. An e-commerce service provider may hold an AIP, 'peripheral identity token, such as a constant HTTP cookie data', because an identity token may have been previously operated through -AIP registration, and if the e-commerce service The provider does not have an AIp domain identity for the user, then the e-commerce service provider may deny access to the requested resource in step 2. It is possible for an e-commerce service provider to act independently of the user while also implementing the present invention, such as authenticating the user in step _ and prompting the user to provide any attribute information that stores his / her attribute information. The identity information of the provider, or prompt the user to provide the required attributes directly to the e-commerce service provider. However, these actions will not have the advantages provided by the present invention. It is an object of the present invention

O: \ 89 \ 89077 D0C -38- 1246005 Operation: Prevents users from moving more efficiently in the-federated environment. Therefore, in a federated environment of an e-commerce service provider, they can trust the μ domain identity token. The existence of is better; the identity information of any attribute information provider about the user storing his / her attribute information can be obtained from the unchanged AIP domain identity token, thereby reducing the burden of providing information for the user. Eight: And, in --- e-commerce service providers can trust the constant slow domain domain to pay. Before existing, to provide the identity of the attribute information provider from which the attribute information of a user can be retrieved, the Aip domain identity token must be established in some way, such as by pre-establishing this information through the AIP registration operation. One messenger and one Shawnding e-commerce service provider register user attributes. Conte (, the identity of the person, and then store this information in the e-mail service provider's use of AIP, .., domain S, etc. §. Domain identity tokens can be created through many different procedures, In particular, the AIp registration process in which the user approves the user ’s AIP information for continuous storage, that is, the identifier of the attribute information provider who manages the user ’s attribute information on behalf of the user. These registration procedures are proposed in (TBD), the United States The number of the special case (AUS92〇0020〇387us 丨) is described in more detail in "Me than and system for user enrollment of user attribute storage ma federated environment". Now Mai Referring to FIG. 7, a flowchart depicts an e-commerce service provider attempting to retrieve attribute information from a multi-attribute information provider that is ordered by a user (which is attempting to access a resource on the e-commerce service provider). A subroutine. Figure 7 describes the subroutine that may be executed in conjunction with the program shown in Figure 6.

0 \ 89 \ 89077 D0C -39- 1246005 Step 6 1 8 in Figure 6 checks the response message that has been returned by an attribute information provider in order to determine whether the attribute acquisition operation was successfully completed. The program shown in Fig. 6 is used in an all-or-nothing manner. This all-or-nothing approach to the operation of spearheads can be useful in some environments. Attribute information providers may return instructions to obtain a place. Various status codes for the range of success on the attributes of the month. Therefore, the e-commerce "provider can check whether any attributes have been successfully retrieved, and then, the next action, as shown in Figure 7 in more detail. See Figure 7 'After the e-commerce service provider has received and checked the -attribute acquisition request message from an attribute information provider, for example, as shown in steps 614 and 616 of Figure 6, the e-commerce service The provider obtains a list of zero or more retrieved attributes from the attribute acquisition request message (step 702 ^ in-fetching the attributes of the attributes previously requested by the e-commerce service provider 2 (step 7G4) 'compare the requested attributes The list and the month of the retrieved attributes determine whether any attributes have not been retrieved successfully (draft step). Or = The e-commerce service provider may be able to obtain the information in the request message from the attribute information provider alone. The information returned is used to make this judgment. If there is no unrecovered attribute in step 706, that is, the request == the attribute of the contact information provider == indicates that the sexual acquisition operation was successful (step), and the child: 70 In this case, there is no need to contact another attribute. There is an attribute. "The supplier has all the attributes required by its user for specific operations. If some attributes are not retrieved, the e-commerce service provider does not necessarily need to

O: \ 89 \ 89077.DOC -40- 1246005 Abandon the attributes of the current transaction to obtain operation. In the program, it seems that the e-commerce service provider can only contact :::: = to retrieve the attributes of the user. However, there may be multiple implementations and initiations of the initial resource request. ^ Provided No. 608 cattle, related. At steps 006 and 608 in FIG. 0, unlike the identity of the unchanged ΑΙρ_ identity attribute provider, Α 乂 好 乂 is better than W ... The identity token may contain multiple attributes of the provider. List of sequences. In other words, after the e-commerce service provider has tried to obtain the attribute from a single order-θ °, the e-commerce service provider may have it; the additional attribute information of the attribute information retrieved by the supplier can be retrieved for trial. Back to use so 'if there is a disagreeable property, the supplier will also pick up the material service -_). It is judged whether there is any list (M ^ b, other attribute poor information providers have not yet joined the second == phase attribute information (step 712 if h _ step), and the subroutine ^. ^ At ¥ ίέ In the situation, e-commerce service provider sr is another attribute information provider, because e-commerce service ^ supplier 6 has contacted the user with all the attribute information providers. If = Yes-attribute information provider Has not yet been used to attempt to retrieve the names or identities of the down-attribute providers in the list (step 716). In a manner similar to steps 612 and 618 in FIG. 6 Method, the e-commerce service provider generates a name containing the attribute that has not yet been retrieved—attribute acquisition request message (p. 718)-redirects the message to the appropriate via the user's device

O: \ 89 \ 89077 DOC -41-1246005 Attribute Information Provider (step 72), so for the time being — the private list of the attribute information provider's youth list. Using, you can start the + p sequence shown in Figure 7 multiple times early in the month; in this way, the subroutine shown in Figure 7t may be extended by the processing performed between steps 616 and 618. The situation of Figure 6: The e-commerce service provider recently requested the use, six / months early, which may be the attributes required by the e-commerce service provider to complete a requested operation of the parent or user. List. Qiu Er =: = Γ The service provider may have decided to request only a subset of the user attributes required by the user. If the service provider has previously decided to use more than one attribute: provider , Then the e-commerce service provider will continue to retrieve unsolicited attributes from other attribute providers. In other words, even if the attribute attribute ^ provider returns all requested attributes, there may be additional attributes that are not Retrieved. The e-commerce service provider will then add all or a subset of the unrequested user attributes to the list of attributes that have not yet been retrieved. In this way, the e-commerce spear: The service provider * must be under the __attribute The attributes obtained in the request message are not obtained. The description of the remaining diagrams focuses on the specific aspects of the present invention. The present invention can be implemented in the _ preferred joint environment described above with reference to FIG. 5_7. Table 15 No-better federation environment, and Figures 6 and 7 describe the preferred process for retrieving attribute information from an or multi-attribute information provider when a user initiates an interaction with an e-commerce service provider. The remaining description of the drawings used to allow a user to control the dissemination of information program of the user attributes. In particular 'if the e-commerce service provider requires the user attribute information

O: \ 89 \ 89077 DOC -42-1246005 It is easy to come, after a user has initiated a transaction with an e-commerce service provider ', the e-commerce service provider obtains the attributes of the user who initiated the transaction The “identifier” of the provider (for example, the user ’s -AIP domain identity token). E-commerce service provider submission—request the attribute information provider 'to retrieve the user's attribute information. " "During the acquisition of the user's attribute information, various processing items may be published, and the attribute information provider may need to communicate directly with the user. For example, an attribute information provider may support— The user must determine the policy for the release of certain information. As another example, the attribute information provider may not be aware that the requested user attribute is poor. The present invention supports the processing environment, where the attribute information provider Before responding to a request from an e-commerce service provider, you can directly communicate with the user during the transaction, as detailed below. See Figure 8 A-8C,-Group Flowchart Description-Attribute Information Provided The process by which the buyer decides whether it should provide the attribute information of the two users at the request of the e-commerce service provider. The flow in Figures 8a-8c shows that when a sub-business service provider sends out-attributes as described in Figure 6 above When obtaining the demand message to the supplier of the property information, it is possible to send a set of procedures in the property information provider. Redirected by HTTP from-specific user's-e-commerce service provider received-when the attribute acquisition request message, the process begins (step 02). The sex provider confirms that the attribute acquisition request message is from-a trusted sub-business Service provider (step 804). If not, then the property information

0 \ 89 \ 89077.DOC -43-1246005 The provider may ignore the message or return an error message. A user identity is retrieved from the attribute acquisition request message (step 806), and a judgment is made as to whether the user is recognized by the attribute information provider (step 808). E-commerce service providers and attribute information providers may be able to exchange and resolve user identities according to a common identity management scheme in an alliance. If the user is not identified, the program branches and returns—an error message. If a user is identified, the attribute information provider maintains certain types of user accounts or user profiles for the identified users. The identified user attributes are retrieved from the repository maintained by the attribute information provider (step 81), and it is best to issue a policy with the identified user attributes-starting to retrieve (step 812) ); In other specific embodiments, it is possible to restrict attribute processing without issuing policies. List of requested attributes 疋 Obtained from the attribute acquisition request message (step 814), and then the affiliate provider can begin to determine whether any attributes should be returned after a request from the e-commerce service provider. Qian Ke Spear Force :::: ㈣ The provider currently holds all the user attributes requested by the e-commerce service provider to make a judgment (step 816 is not, the program branches to the map criminal to display ^ The provider is currently your household -#Order if the attribute is poor, all the attributes requested by the saver e-commerce service provider, then for g ^, the user-owned user attributes can be provided by the attribute information business service provider— # 断(Step Chuan). The second order branches to the subroutine shown in Figure 8ct. If all the genus' can be issued to the e-commerce service by the attribute information provider

O: \ 89 \ 89077 DOC -44- 1246 055, then the attribute information provider determines the requested attributes and all user attributes are issued to the e-commerce service provider. Therefore, the attribute information provider creates an attribute obtaining response message containing one of the requested user attributes (step δ20) and sends the attribute obtaining response message to the e-commerce via HTTP redirection via the user's Liu Lan The service provider (step 822) to complete the process. It should be noted that other methods may be used to return attributes from the attribute information provider to the requested e-commerce service provider. For example, instead of returning a copy of an attribute in a genus I. Health Pickup response message, an attribute information provider may return a message containing only the genus in the form of a resource name or resource identifier (· 生 之 &帛 'The e-commerce service provider will use the indicators to retrieve those attributes. The indicators may be securely transmitted between the attribute information provider and the e-commerce service provider through a mutually authenticated secure socket layer (SSL) to protect the indicators from Unnecessary disclosure 'to ensure that only e-commerce service providers can use this indicator. If a large amount of user attribute information must be transmitted and there is a protocol limitation that limits the amount of data that can be transmitted at any one time', only one is returned The index method is particularly useful. Referring again to step 808, if the user identity in the attribute acquisition request message is not recognized by the attribute information provider, then the attribute information provider creates-no attribute acquisition response message (step 824) In the first defense step, through the user's redirection via Ηττρ, get the attribute response. Commerce service provider term ". Affirmative responses ,, and NO Cloth response, "used relatively, and as will be further explained in detail" the present invention changes in response and various types of status of the return of the part support.

O: \ 89 \ 89077 DOC -45- 1246005 Shidi 816 steps, if > service provider Beixun 9 the donor does not currently have an e-commerce provider Figure 8B. All the users who happened to be ten years old, then the program branches to referring to FIG. 8B 'Attribute Information Provides the attribute information provider and the user to print and input the sexual information. The user who has the requested attribute of Μ $ belongs to the attribute poor information provider-judge (step 832, user ^ attribute poor information input

In step _, the program branches back to step 824 in FIG. 8A, and returns a response message with the attribute of u, 3, and 3. If you want to remind the user whether to use ^ ^., 1 can be done according to one or more processing flags of the attribute information provider. For example, when a user ’s account is tasted in the attribute information provider, the user ^ ^ X At (for example, when a user logs in to the service), the user may have already been asked to select the option _ Prompt the user at the appropriate time for any attribute information that the attribute provider does not currently hold. This type of option is advantageous because of the following reasons. As shown in FIG. 8B, “§ An attribute poor news provider may have many times when the attribute information of the e-commerce service provider requests ΓΓ, the attribute information can be used to improve the field — and the user attribute is“ there ’s ” User tips. Over time, the contention of + continuing a soil and a taxi, Tian Gengxi's tribute may be expected to decrease when managed by an attribute information provider. However, if the producer manages his or her user attribute information 'in a multi-attribute information provider, there may be many such opportunities across many attribute information providers. Over time, users may become disgusted and respond to many

O: \ 89 \ 89077.DOC -46- 1246005 ΊΚ. If you can do it, you can choose the option of lacking attribute information. The user should not be missing, if the user sees it Attribute Information 4th & provide a set of attribute information to the address, and the donors are the main users of the donor, then the user can choose $ 贝 Λ to provide k options . Although the user can provide any user attribute information to the attribute information provider, if you use the ❹ = item, it can be expected that the attribute information provides the attribute information of:. This expectation is reasonable: The second liver is more likely to not provide user attributes. Flfl 〇3 However, 'If the user considers the attribute information provider as: — corpse: sex: information provider, the user may reject this choice. Items by which = certain attribute information is stored in a specific attribute information provider. In addition, the user may reject this option to limit the number of times the user will be prompted to request information by different attributes, which is to reduce the number of annoying reminders. As another example of how a property-poor provider might use a flag for prompting users, an e-commerce service provider that issues a property information retrieval message may set a flag in the message to inform the property feed Whether it should prompt the user. Since the e-commerce service provider should know whether it will contact other attribute information providers when trying to retrieve the attribute information of a specific user, the e-commerce service provider can inform the f sex information provider whether to prompt the user Request any attribute that the attribute provider does not hold. For example, when e-commerce services

O: \ 89 \ 89077.DOC -47- 1246005 When the provider is sending an attribute acquisition request message to the last attribute information provider in the user's set of multiple attribute information providers, the e-commerce service provider may set this Flag. In this way, prompting the user = the last attribute information provider in the union will be the last resort for obtaining the attribute information that may be needed to complete a particular transaction. a Or, the e-commerce service provider may set the -flag 'of the attribute information retrieval message 2 to indicate that the attribute information provider receiving the message will be the last attribute information provider contacted by the e-commerce service provider. In this case ', the attribute information provider is not told to prompt the user. Instead, the I / O feed I might use the flag as part of whether or not he wants to be prompted—part of it. Other optional flags may also be included in the message between the e-commerce service provider and the attribute provider. If the attribute information provider should be equal, then use it in requesting and receiving. Input (step δ34: the newly provided user attribute information (step 836)) and all user attributes requested by the sub-business service provider are judged in step 838). In other words, the user may have refused to provide the same -IT -te 4- 4 7 Shu Beicheng. If the property is cautious, the donor has requested the 8th, 8th, and 8th steps of the self-propelled property. The private sequence is to return to step 818 in Figure 8A to determine whether the provider has not obtained all the requested Belong to; If step 824 in the attribute information is returned, then the private sequence branches back to _ again the next day "attribute to get the response message. ≫ Figure 8A, if at step 818 all the attribute information is not

O: \ 89 \ 89077 DOC -48-! 246〇〇5 can be released, then the program branches to Figure 8c. Referring to FIG. 8C, the attribute asset percentage | y permits the attribute asset 2 to request rotation from the user to indicate (the first step). In other words, it belongs to: mention: the use of any requested attribute line policy, asking the user if he wants to take turns that may be requested by the attribute sender and the user previously restricted the slavery (step 844 ) And storage change 11 ° on receipt (Sakizaki soft w heart m — permission to issue all the requested money (No. 848 7 = no bed has been allowed to sect yiyi 丨 door. Goguo 裎 this way then the order knife Go back to step 820 in Fig. 8A. Choushun seeks a mouth from field 2-affirmative attributes get a response to the flood, and if it is not, then the process step is worth π — ^ Jin Daozhi returns to FIG. 8A. 824 'returns a false attribute to obtain a response message. As shown in FIG. 8A-BC, at some point M returns a return to the shore to identify workers — ^, the mm step of the attribute information provider construction and integration. In the graph δΑ, such as the figure from the Chinese capital, 的, the program of the ,,, and the member is like the attribute, σ ki, and the person successfully returns all the masters and the spirits from 6 pounds. It just works like failure. For example, only the attribute that belongs to it, and only if the attribute information L: = provider has All requested attributes are generated at the 苐 Ka step-kent / line of all requested eclipses, 1. The response message of the master V Shiyue 疋. In all of its monthly conditions, 1 is determined at step 824. Reporting the status of the acquisition operation is all: some implementations may be useful in the present invention: the way in the present invention-the glycosides may only return an indication of the successful acquisition, makeup performance, and range of unspecified attributes. All kinds of heart codes. For example, even if the property is qualified /, this is enough to get back some

O: \ 89 \ 89077.DOC -49-1246005 jin month long attributes ’may return various positive status codes. If the attribute information provider does not hold any requested attributes, or if the attribute information provider is not sufficient to issue any of the requested attributes it holds, a completely failed status code may be used. After the requesting e-commerce service provider receives the response message, the e-commerce service provider can check whether it has successfully retrieved the next action that can belong to it and decide its next action, such as trying to get the remaining attributes, such as This is described above with reference to FIG. 7. Figure 8D_8E describes an example of a procedure that may be used by an attribute provider to report partial success in retrieving attributes. The invention can be implemented independently of any particular format of the request message and the response message. Positive and negative attributes to obtain response messages may have similar data structures. Response messages may be encrypted to protect user attribute information. It should also be noted that H, in two cases, the attribute information provider may insert: the information, or mask the internal message of the response message, in order to prevent the stealer from distinguishing successful and unsuccessful responses; for example, blocking a series of unsuccessful responses A successful message may still provide information about the system's ability to obtain attribute information. Referring now to Figs. 8D-8E, a group flowchart depicts a subroutine by which an attribute information provider generates a -response message to an electronic business service provider (requested-acquisition of attributes of a particular party). The subroutine shown in Fig. 8D may be used to generate a response message and only return some attributes that the e-commerce service has requested. Therefore, the subroutine of the trunk in Figure 8D-8E can be used to replace steps 816_82 () and 824 in Figure 8B.8C and Figure 8A. It should be noted, however, that the procedures of the names and scholars in the figure are only target examples of the present invention and should not be construed as exclusive specific examples.

O: \ 89 \ 89077 DOC -50- 1246005 卞 The program starts with $? The user enters any attribute requested by the information provider, and does not hold any of the requested attributes. # 田 $ 始 (step 852). The subroutine is distributed by the user. The user can choose to release the attribute information. The ML points 1 are saved as non-distributable attributes (for example, before the attributes can be issued by an attribute issuer M, and the aunt F7 t 不 will not be issued. The attribute of the user's β 疋 same thinking) ^ 〇 The selection of the attribute that is explicitly sought continues (step 8M). Step milk and step 8M, select the function of the display. When repeating the § response message in Figure 8B and Figure 8C, μ # and flags can be used to track and obtain the requested initialization. “ATT Λ” Guanzhong, two processing flags are used: Initialization ALL-MAiNTAINED, 丨 flag "Mercedes information provider is" "Brother 856 step) to chase the genus" all_releasabl U _ whether the originalization of a donor can be issued into ^ bad) to track the poor information Know all requested attributes. The subroutine then passes the list of requested attributes retrieved by the message from step 814 of the figure. From the next one, the long eyebrow Θ takes the name of the attribute that should be processed early (step 862 does not need to be based on any specific, β & +, some attributes may be ordered in a special order) , Attribute (step 864). 鈇 德 斟 μ st is entered into the response message; after 3, the attribute information provider is yes-determined (whether the attribute is retained in step 866), and the result is a judgement. The provider can make a decision on whether the attribute is requested (the %% then retrieve the value of the attribute (step)). D. If it is, the provider of the trait attribute is not in the first place. _Reset all steps ”Α has the attribute T explicitly requested, and then the“ all-maintained ”flag (S7? This information provider cannot issue ^ in step 868). If it is a month rule attribute, So heavy

O: \ 89 \ 89077 DOC -51-1246005 The "ALL_RELEASABL £" flag is newly set (step 874). In either case, a false value is assigned to the requested attribute (step 876). The attribute value or the assigned false value is then written into the response message (step 878). A judgment is made as to whether the list of requested attributes has more attributes that have not yet been processed (step δ80), and if so, the subroutine branches back to step 862 to obtain the next requested attribute. If there are no more unprocessed attributes in the early morning, the status of the response message is set according to the value of the processing flag (step 882). For example, if HMAINTAINED, the flag or the "all-releasable" flag is not 5 and 疋 'then at least-the attribute is not retrieved as requested, and an appropriate status code can be selected as the response message. Then the subroutine is completed, after which it returns the knife to the main routine 'to send a response message to the e-commerce service provider. Referring now to FIG. 9A, the user is being requested to enter the attributes of user attribute information to be used by an e-commerce service in a federated environment. A provider provider presents a graphical user interface window to a user. Windows 900 is a typical browser application window. A user will previously use it to request a resource from an e-commerce service provider, which is to initiate a different kind of punishment for an e-commerce service provider. ^^ ^ 3 ^ — # Father of i. In most webpage environments, the controls that are visible in the 900: may be presented as a file in η form (that is, rendered by a browser application running on a client device operated by the user). Webpage). Tool Qing contains the typical control used in _Applying King-style Video. 〖〖Button 9⑽ allows a user to ‘do n’t the user have completed the rotation operation, and then click this button to allow

O: \ 89 \ 89077 DOC -52- 1246005 It is easy for Xu Yi to cancel the rob of the husband's decision. The reset button 908 allows a user to quickly return to a missing value or clear all input fields. The user may see the name of the e-commerce service provider at the top of the content area in the window. This allows the user to see which service provider is completing the pending transaction. In the example towel shown in FIG. 9A, the attribute information provider attempts to maintain a consistent look and feel throughout all graphical user interfaces seen by the user during an undecided transaction. Therefore, the inside of the window 900 = the area 9 of the area may include the information that the user may see on the webpage proposed by the e-commerce service provider (the user is making a transaction). This means that the user's e-commerce service provider is controlling undecided transactions, even if the attribute information provider temporarily interferes with managing the user's attribute information as part of the undecided transaction. In a web browsing environment, an attribute information provider may use a set of frames in an HTML document to create this table. Users may want to review any relevant privacy policies before entering or publishing user information in order to make a informed judgment as to whether the user really wants to complete a pending transaction. Button 912 allows a user to view or review the privacy policy of the e-commerce service provider, and button 914 allows a user to view or review the privacy policy of the attribute information provider. s — When the attribute information provider determines that it does not have one or more attributes requested by the e-commerce service provider, it may present a window 900 to a user, as described above with reference to FIG. 8B. The input stop 92〇_928 allows the user to input the value of the requested attribute. The option button pair 93 is related to the input field. Each pair of yes / no option buttons allows a user to specify whether they should

O: \ 89 \ 89077.DOC -53-1246005 This prompt-user requires issuance-permission for a specific attribute, thereby allowing the user to control when the attribute-poor provider actually issues the attribute, spit. In other possible specific embodiments, other licensing restrictions may be provided. ’After the user inputs the information, the provider stores the value of the attribute’ so that they can be used for subsequent transactions. Following the previous example, the requested information will eventually be used by the e-commerce service provider with an undecided transaction to perform an authorized operation. Referring now to FIG. 9B, a graphical user interface window is presented to a user by an attribute information provider (of which a user is being requested to issue user attribute information to be used by an e-commerce service provider in a unified environment). In a manner similar to Windows 900 shown in Figure 9A, Windows® is a typical browser application window that a user would use to request-resources from an e-commerce service provider. Guard column 942 contains the typical controls used in the Liu Lanying application program window. The stomach OK button 944 allows a user to indicate that the user's input is complete, and CANCEL allows the user to cancel the pending transaction. Press button 948 to allow the user to quickly return to the default value or clear all input slots. In a manner similar to the one briefly described in FIG. 9 above, the attribute information provider has a long tradition of maintaining the consistent look and feel of all graphical user interfaces seen by the user during the undecided transaction period Pa1 '. Therefore, the area 95 of the inner valley area of the gazebo 940 also contains the same information as seen by the user in the window_. A user may want to look at any information before entering or turning on the privacy policy, so that user information is issued in a manner similar to that described with reference to FIG. 9A.

O: \ 89 \ 89077 DOC -54- 1246005 Whether the user really wants to complete the unresolved and easy-to-learn notification. Press: 9 5 2 Allow a user to view or ~ 払. The privacy policy of the e-commerce service provider is well known: New York 9 5 4 allows one to use the entry into the project. 1, the user can view or review the privacy information provider's privacy policy. Tian I " Sang Bei afl provider judgment-when one or more attributes requested by the e-commerce service provider are undistributable as described above with reference to Fig. 8C, a window 940 may be presented to a user. Although 鈇 太 八 aa 心 4 Although the present invention allows—attribute information providers to support various restrictions, but this is a dagger—Shu has changed this to be restricted by the user, so that they can only be used when the user clears each & @, 殳(For example, as indicated by the use of a yes / no option button in FIG. 9A). In addition, the user interface may provide multiple temporary restriction examples for each attribute. One option indicates whether the attribute is to be issued to an undecided transaction, and the other option indicates whether the attribute is to be issued permanently. The requested check box (Check Βοχ) 956 allows the user to clearly indicate the difference between the unsettled items. ^ Whether the property requested by the owner is easy to be issued to the e-commerce service provider, otherwise The checkbox 958 in reverse allows the user to explicitly indicate whether the requested attribute is to be issued permanently. As another option, the attribute information may concern the user's choice with a particular e-commerce service provider, so that the restriction applies only to transactions from a specific domain. Or, when the user is required to input or change some attribute information, the attribute information is provided. This allows the user to manage the attributes of all users and related options. It should be noted that there are other options that allow the user to narrate the user's attributes. For example, checkboxes do not allow —

0 \ 89 \ 89077.DOC -55- 1246005 The user indicated that no attributes for the undecided transaction should be issued from the attribute information provider; the selection of the check box _ will enable the check box 956, and the check box will not start 958 failure. Check box 962 allows-the user instructs the user to refrain from issuing the requested sex to the requested e-commerce service provider at all. Alternatively, the user may have the ability to specify general domain restrictions, such as identifiers or domain names of other e-commerce service providers where the user wants to restrict the origin of the attribute. Checkbox 964 allows—the user instructs him not to request an e-commerce service & the supplier tries to find out the attribute information of the source through other sources, for example 'except for the attribute information currently being requested from the user for input Providers other than Providers, “Information Providers, as may occur in the sequence shown in Figure 7. The choice of ah checkbox 962 or checkbox 964 may be communicated back in some way to the private merchant & service The provider, for example, obtains a status code or a control flag in the heart through the attribute. It is assumed that the requested e-commerce spear is a joint environment red 2 that the service provider cooperates with other entities in the joint environment. It is expected that the e-commerce service provider will abide by the user's choices. This will prevent the e-commerce service provider from contacting other property providers to obtain the attribute information required for the undecided transaction. If a remote selection check box is used 962, then it can be expected that the user has basically settled the transaction, because after 4 'ΛΑ 士 7 ", Ming Wei's pen business service provider will need anything. For example, if the user wants to sigh, then if the user selects check box 964, if the requested electricity is not provided by the provider, the attribute information is not currently requested from the user.

O: \ 89 \ 89077 DOC -56- 1246005 • μ, -v The main correction at -v can expect undecided transactions to fail. Check box 964 also has a reduction and ease of use, and the user may experience and take advantage of others that may be contacted by the minework permit service provider. This brings down the advantage of the "quotation of sub-suppliers trouble". As mentioned above by the Besun provider, one attribute information is listed in the second and seventh, and the various status codes are returned from the ++ by the moon, and the "ego" e-commerce service is provided ^ flag resources / i £ The two yards of soil collection can include when the attribute is given by the donor—the interface of the material will be / 1 into the flim recognition—the user uses the user to turn in k, the attribute is stored in the poor news provider, or lost. The processing & option selected remotely by the disaster test. Once again, according to Figure 7, the flowchart shows the attempt to use it to retrieve-Wei "n The e-commerce service provider He Jue and & Father Yi needed the diagram The program shown in 7 will be expanded to handle codes or flags that may be returned in the message. f response

For example, if you select check box 964 for m 4 · ».gg 4T & then the property resource provider will get the shore back at the property + Bessant's limit flag will indicate + this uncle, electronic Each service provider should not continue to contact other suppliers, as shown in Figure 7, if neodymium suppliers are needed in the future; ° Service providers will continue to process transactions, which may include losing transactions. May impose other conditions or restrictions on the user, or control access to e-commerce services, and return— " shipping should adjust its processing in accordance with the parent-control flag it receives from the attribute information provider. / 、 After the user chooses to input in the window 940 of FIG. 9B, if he wants to: the attribute information provider stores the distributable instructions so that they can be used by the parent = easy to use. If the user does not issue—or multiple Requested Attributes then undecided transactions may fail. Attribute information may be masked to avoid

O: \ 89 \ 89077 DOC -57-1246005 when exposed. 8B-8E again, an attribute information provider may provide a user opportunity to enter attributes and related options, for example, by calling the user interface shown in FIG. 9B. However, if the e-commerce service provider has a _scheduled list of multiple attribute information providers, then the e-commerce service provider may contact a series of attribute information providers to retrieve the user's attribute information and J. Since the e-commerce service provider has the opportunity to retrieve the user's attribute information elsewhere, the attribute information provider may not be suitable for presenting the user interface shown in FIG. 9A and the request. 2. For example, if the user has a property that is stored in the multi-attribute information provider, Λ ', then the user may be troubled in the following situations. The detainer has selected a permanent list of one of the ordered attribute information providers, and the user knows that any user attributes that may be required for online transactions are stored in the attribute information storage provider selected by the whai group Somewhere. When the telecom service provider sends an attribute acquisition request message to the first attribute investor, the first attribute information provider proposes a user to the user: face i, its input destination first attribute information provider Unretained attribute information: Another aspect of the user's failure to retain the required information from the attribute information: the provider gets confused and / or anxious. In this case, one of your brothers and one attribute information provider did not provide e-commerce service providers. Before entering the attribute information, the user should contact another attribute information provider's machine to avoid this situation. The e-commerce service provider may include a flag in the attribute message, indicating the attribute information to receive the request message. O: \ 89 \ 89077 D〇c -58-1246005 Whether the information provider should prompt the user to request the required information. In this way, the e-commerce service provider can go through the list of attribute information providers in a sequence as described above with reference to FIG. 7 while indicating that the attribute information provider should not Any property that is not held or that the property resource provider judges to be unavailable. After contacting all the property information providers and making the property acquisition operation fail μ, the e-commerce service provider may pass through the collection of property information providers m times. In other words, the e-commerce service provider may send another ―attribute acquisition request message to the first attribute: Sfl provider‖ and instruct the attribute information provider to prompt the user that the attribute information provider does not hold it or that the attribute information provider judges that it is not possible to issue 9A and 9B. As a result, all attribute information providers are contacted before prompting the user ^ for additional information as shown in Figures 9A and 9B. When multiple attribute information providers are supported, those in a federated environment Entities may dictate or judge—policies about how entities should act in such an environment. Whether or not they support multiple Attribute information providers, those entities in a federated environment may have policies that guide or determine when a user should be prompted for information. Various restrictions may be contained in the privacy policy of the attribute information provider or e-commerce service provider. 4 Various restrictions can be found in b.3 in the contracts established by Tian and other entities when they enter a trusted corporate relationship. In other words, 'descriptions of options that can be selected by a user may be managed by those Service provider configuration, in particular from the point of view of one or more common policies maintained by the service provider or required for mandatory membership in the alliance as part of the membership. Advantages of the invention The invention is provided above The detailed description of it should be

O: \ 89 \ 89077 DOC -59- 1246005 疋 It's obvious. The invention allows a user to make a contract with one or more attribution providers. Users maintain a relationship with these attribute information providers and provide user attribute information stored and maintained by those attribute information providers. If a user uses more than one attribute information provider, what is missing—information may be duplicated—that is, those attribute information providers do not necessarily store mutually exclusive sets of data items. An e-commerce service provider, such as an online banking store, also maintains an __ relationship with the attribute poor news provider, so that the e-commerce service provider can trust the user attribute poor news provided by the attribute information provider on behalf of the user. The user can visit any e-commerce service in the federated environment, and the provider 'does not have to establish a relationship with that particular e-commerce service provider in advance. As long as the user has at least a relationship with the attribute information provider, the user will It is possible to have all the information provided by an e-commerce service provider without the need for a monotonous operation. Thanks to the present invention, when a user attempts to access a protected data of an e-commerce service provider in some cases, it will inevitably be interrogated to request that I " Bezunw allow the network in the wheat and union environment To some extent between domains: by mobile. Users get some efficiency or productivity by not having to complete multiple requests for information, which may be a barrier to free movement between websites

Moreover, with the present invention, the user attribute information can be permanently stored in a network ^ (Go to a location other than the client device of m I. Even those entities in the joint ring i cannot permanently store and use the I client Information on the device

0 \ 89 \ 89077 DOC -60- 1246005 The user's attribute information is obtained from a combination; especially when the "body" ... "n" body still does not have the desirable person's attribute information, it can be stored and used for a long time. Zheng Di ^ Adopts private restrictions through legal restrictions or contracts. In addition, the present invention provides a method of non-π attribute information, A ~, Xiong Yin Bao use the stored on the client terminal-yp The spirit body of σ does not have actual ability and user attribute information on mobile telephony. For example, the former: ::: a wide range of donors who can respond to requests from e-commerce service providers can directly During the transaction, the user communicates with the user during the transaction: ... %%. Attribute information providers can follow the limits determined by a usage system-service provider, an alliance, or some other entity: = 1 issue policy management User attribute information.-User may: select: various processing selectors for the storage and management of user attribute information /, the latter attribute poor information provider follows the user's choice. It is important to note that although the present invention has To-fully functional information Description of the processing system 'The person skilled in the art will find that the program of the present invention can be distributed in the form of instructions in a computer-readable medium, and in various other forms, regardless of the signal delivery that is actually used to implement the distribution Specific types of media. Examples of computer-readable media include, for example, Electronic Programmable Read Only Memory (EPROM), Read Only Memory (_), Tape, Paper, Soft =: Hard Disk Drive, Random Access Memory And disc media; and transmission-type media, such as digital and analog communication links. Methods are generally considered to be a sequence of steps that lead to the desired result. These steps require the actual processing of actual numbers. Although not necessarily, These numbers O: \ 89 \ 89077 DOC -61-1246005: often use the form that can store, transfer, combine, and compare: sexual signals. Mainly for reasons of common use, there are J ^ some signals are bit, value, 夂^ 5. Numerical values, items, components, objects, symbols, ΓΓ, terms, numbers, etc. are convenient. 'However, it should be noted that all of these numbers are conveniently labeled.疋 Application = For the purpose of illustration, the description of the present invention is presented, but it is not intended to be exhaustive ... It is based on the specific embodiments disclosed. Many modifications and changes will be apparent to those skilled in the art. $ 此 I # Α Explanation The principle of the invention, and the choice of straight U to solve the art, the person skilled in the art can understand this: each: 1T can be suitable for other intended use-like, with various modifications to reveal various specific embodiments. [Schematic description of the diagram] = The characteristic statement of the singular characteristic is attached in the attached application patent model 2: refer to the following detailed description and read the accompanying drawings to explain the invention itself, the purpose of further steps, and its advantages, of which FIG. 1Afe describes a A typical network of data processing systems, each of which can implement the present invention; Figure 1B depicts a typical computer architecture, among a data processing system; Figure 1C illustrates a possible implementation. The present invention is based on a webpage-based environment. Please be a data flow chart to explain the technical procedures that may be used when a client tries to access the source of escort; ', Figure 疋 block diagram' description Typical online transactions that require user attributes

O: \ 89 \ 89077 DOC -62- 1246005 Example; Figure 3 is a block diagram trust relationship; describes a set of entities can establish a typical handover Figure 4 is a block diagram Figure 5 is a block diagram environment; Description 1 A typical federated computing environment; Describe a flowchart of a preferred federation in which the present invention can be implemented, explain a procedure, an emperor tells 4 M% sub-business service providers to borrow, and aims at an attribute information provider The first place is to access the attribute information of the user who is one of the poor sources of the e-commerce provider; the flow of 'explanation—subroutine, —the e-commerce service provider mistakes its sequel to the order The attribute f information provider retrieves the usage information that is being sampled in one of the resources of the e-commerce service provider; Figures 8A-8C contain a set of flowcharts illustrating an attribute information provider to borrow and decide on -e-commerce Procedure of whether the attribute information of a user can or should be provided when requested by the service provider; Figure 8 Please include a set of flowcharts illustrating how an attribute information provider generates a response message to send it to the request-specific user The process of obtaining an attribute of an e-commerce service provider; Figure 9A is a graphical user view of the user presented by the -attribute information provider ® '4 asking the user to enter by the -e-commerce service provider at User attribute information used in a unified environment; and Figure 9B: A graphical user presented by a user to a user by an attribute poor information provider! a ’requesting that the user issue be issued by an e-commerce service provider

O: \ 89 \ 89077.DOC -63-1246005 User attribute information used in a federated environment. [Illustration of symbolic representation of the figure] 100 distributed data processing system 101, 110 network 102, 103 server 104 storage unit 105, 106 ^ 109 client 107, 113 personal digital assistant (PDA) 111 wireless phone 112, 114, 115, 116 wireless link 120 data processing system 122 central processing unit 123 internal system bus 124 random access memory 126 read-only memory 128 input / output connector 130 printer 132 disk unit 134 communication connector 136 communication link 140 keyboard 142 mouse 144 display connector 146 display O: \ 89 \ 89077.DOC-64-1246005 148 150 user interface connector client 152 browser 154, 158 web application server 1 56, 1 60 Domain name server domain 162, 164 Authentication server 170 171 172 173 174 175 176 177 178 179 179 180 181 182 183 200 202 204 204, 208, 212, 216 Client server user request at `` ibm. com "page HTTP request without identity information available authentication challenge user client provide information authentication response server authentication Certificate user / client HTTP response user request Another page on "ibm.com" HTTP request valid chat HTTP response user ISP domain attribute information manager (AIM) O: \ 89 \ 89077 DOC -65 -206 1246005 210 214 220 222 224 226 228 302 304 306 308 310 312 400 4i〇, 420, 430, 440 412, 422, 442 414, 424 '444 416 418 419 500 502 510, 520, 530, 540, 550, Government domain banking domain domain e-commerce domain client browser HTTP c〇〇kie data cache SOAP client area data storage user trust relationship

Enterprise A Trust Relationship

Enterprise B Trust Proposition Alliance E-commerce Service Provider (ECSP) Authentication Manager (AM) User Registration Database (UR DB) Attribute Information Manager (AIM) User Attribute Information Database Father Easy History Database Alliance User Electronics Business Service Provider (ECSP) O: \ 89 \ 89077 DOC -66-560 1246005 512, 522, 542, 552, 562, 572, 582, 592 544, 554, 564 586 λ 596 570, 580, 590 574, 584 , 594 900 902 904 906 908 910 912, 914 920, 922, 924, 926, 928 930 940 942 944 946 948 950 952, 954 956, 958, 960, 962, 964 Authentication Manager (AM) Attribute Information Manager ( AIM) User Registration Database (UR DB) Attribute Information Provider (AIP) Attribute Management Unit (AMU) Window Toolbar 〇K Button CANCEL Button Reset Button Content Area Button Input Field Option Button To Window Toolbar 〇K Button CANCEL button Reset button content area button check box O: \ 89 \ 89077 DOC -67-

Claims (1)

1246005 Patent and application scope: 1 · A method for managing user attribute information in an official-data processing system, the method includes: A user who is trying to retrieve a user from an attribute information provider belongs to Sheng Beixun A service provider receives a request message, wherein the request Xun Xin 4 provides one or more requested user attributes, wherein the attribute information provider maintains one of the user's user attribute information of a service provider; And before the k attribute tribute provider sends a response message to the service provider, the user is requested to input by the attribute information provider, where the user input contains the user attribute information of the retrieved user indicating the subsequent request A value for the acquisition condition. 2. The method according to item 丨 of the patent application scope, further comprising: after determining that the attribute information provider does not currently maintain a requested user attribute of the user, asking the user not to enter a value of the requested user attribute. 3. The method according to item 丨 of the scope of patent application, further comprising: mentioning that the user does not enter a value of an acquisition condition, indicating that the service provider cannot request user attribute information of a user in another attribute information provider. 4. The method of claim 1 in the scope of patent application, further comprising ... prompting the user to enter a value of one of the issuability conditions of a user attribute. 5. If the method of applying for the fourth item of the patent scope, further includes: O: \ 89 \ 89077.DOC 1246005 6.
Prompt for value. The method of entering the issuability condition, such as the method of item 5 of the scope of patent application, indicates that the temporary limitation is one of the temporary limitations that are valid forever. Steps include:. The methods of u and solid spear, further including the period of parental change, indicate that temporary restrictions are effective for users of service providers. 8. If the method of the 4th scope of the patent application, enter — prompt the user to enter the value of the issuability condition. Step 0 includes: one of the number of domain restrictions 9 · If the method of the 8th scope of the patent application, proceed to- Contains: Indicates that this domain restriction is for service providers. 10. The method according to item 9 of the scope of patent application, further comprising: indicating that the domain restriction is permanent. U · If the method of the scope of the patent application, the method further includes: 』= Do not enter a license condition _ number of 指, means # This attribute information provider should prompt the user about the availability of each-received request message. Issuance condition information. 12. According to the method of claim 11 in the scope of patent application, it-step includes: indicating that the license conditions are permanent. 13. · A method for managing user attribute information in a data processing system, the method includes: k a user receives a request for a resource from a service provider, O: \ 89 \ 89077 DOC 1246005 decides with the A group of one or more attribute information providers related to the user 'where-the attribute information provider is a service provider that maintains the user's usability tribute; 2 out—requests messages to the group-or multiple attributes The attribute provider in the information provider reads the donor so that the user who retrieved the user belongs to the -response message received from the first-attribute information provider; and the decision message = the response message contains- Control-^ Among them, the 5H control flag indicates that when the user attribute information of the user is retrieved, an acquisition condition for the subsequent request from the service provider is provided. For example, the method of applying for the scope of the patent No. 13 further includes: π stopping the acquisition of the user attribute information of the user according to the control flag. 15. The method of applying for the scope of the No. 13 patent, further includes: ^ ',, control The flag performs subsequent acquisition of user attribute information of the user. 16. 17. If item 13 of the scope of the patent application is based on the user-specific operation retrieved by the user, a method for managing user attribute information includes ..., further including: user attribute information of the A resource processing system for data processing. The data processing system is used to receive a request message from one of the service providers who is attempting to retrieve the _use poverty news. : \ 89 \ 89077.DOC 1246005 pieces, of which the request message identification is one in which the attribute information provider is a service provider; and or the requested user attribute, maintaining the user's user attribute resource Before the attribute information provider sends the provider, the territorial one should respond to the message to the service box, the ... attribute poor message provider requests user input, where the user input contains a value indicating that After retrieving the user's pure information of the lunar messenger, the request was made—the acquisition condition. Ιδ · If the data processing system of the 17th scope of the patent application, further includes. Component 'is used to prompt the user to enter 7 after the judgment of the attribute of the two requested users of the attribute information provider currently does not maintain the n One of the user attributes explicitly requested. Μ · If the data processing system in the 17th scope of the patent application, further includes a component, which is used to prompt the user to enter a value of an acquisition condition to indicate that the service provider can request the use of another-light-funded and simple supplier's User attribute information. 20. The data processing system of item 17 of the scope of patent application, further comprising: a value for prompting the user to input a user belonging to 3 pieces. Issuable
21. The data processing system of item 20 of the scope of patent application is used to prompt the user to enter a value of the issueability condition. It further contains: a temporary limitation 22. The data processing system of item 21 of the scope of the claim, further includes eight components to indicate that the temporary limitation is a permanently effective component. / Dagger 3 23. If the data processing of the magic item of the patent scope is applied, the data processing is a reverse step, including O: \ 89 \ 89077 DOC -4- 1246005 to indicate that the transaction is temporarily restricted to a transaction of the user at the service provider. Period is a valid building block. ^ 24. The shellfish processing system of U.S. Patent Application No. 20 further includes: a component for prompting the user to input a value. Conditional—Domain Restriction 25. If the data processing system of the scope of application for patent No. 24, further includes. It is used to indicate that the domain restriction is a component of the service provider. 26. If the 25th patent processing system in the scope of the patent application, further includes: a component to indicate that the network domain limit is also effective. 27. If the patent application scope is 17th, the method further includes: It is used to prompt the user to take one. A component of a value that can be used in the afternoon to indicate where the attribute information provider is located—up, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down, down and down and down and up and down, and each issue of the request message that the user should receive. 28. If the patent application scope is 27, the processing system further includes: a component to indicate that the license conditions are permanently valid. 2 9 · —A data processing system for managing the user ’s attributes and information, the processing system includes: r to connect from-users-service providers-resources-request structure #; A component used to determine the _group—or multiple attribute providers related to the user, one of which is a service provider that maintains user attribute information for the user. ; Used to transport ^ seeking information to the group-or attribute information providers in the property information provider in order to retrieve the user's use of O: \ 89 \ 89077.DOC 1246005 attribute information A component; a component that receives a response message from the first attribute flood provider; and a component that Dan uses to determine that the response message includes a control flag from the first attribute information provider, where the control flag indicates When retrieving the user attributes of the user of 30. 31. 32. 33. ", the subsequent request from the service provider to the attribute information provider-the acquisition conditions. The data processing system according to item 29 of the scope of patent application, further comprising: using: a component that stops obtaining user attribute information of the user according to the control flag. If the data processing system of the scope of application for the patent No. 29, the further step includes: using = to implement the subsequent acquisition of the user attribute information of the user according to the control flag. For example, the data processing system of the scope of application for patent No. 29 further includes: a component for performing user-specific operations based on the user attribute information retrieved from the user. -A computer program product in a computer-readable medium for managing user attribute information in a data processing system, the computer program product including a 'receiver' attribute from a user who is trying to retrieve a use The attribute information—the service provider—the structure of the request message, in which the request message identifies—or multiple requested user attributes: The attribute information provider is one of the service providers that maintains the user's attribute information. And a structure for requesting user rotation by the attribute information provider before sending a response message to the service from the attribute information provider # 89 \ 89〇77 DOC 1246005 provider # '其 " The user input contains a numerical value, which means that when the user's user attribute information is used to obtain a condition for a subsequent request, such as a computer program product in the scope of patent application No. 33, further includes: a component for the attribute The poor information provider does not currently retain the user's-requested user attribute judgment, and prompts the user to take one of the requested user attribute values. 35. If the computer program product in the scope of application for item 33 of the patent, further includes: a component to prompt the user to enter—acquired condition—a value of 3 indicates that the service provider cannot request another User attribute information for users. 36. If the computer program product under the scope of application for item 33 of the patent, further includes. It is used to prompt the user to input a value of ^ ^ 3 ^ pieces. The change is for the user-distribution clause. 37. For a computer program product with the scope of patent application No. 36, enter a value of the “temporary system” for the user to prompt the user to enter the distributability condition. . The Genius System 3 8 · If you apply for the 37th computer program product of the patent, you can add a spoonful of people to indicate that the temporary restriction is a permanently valid component. · 39. If the computer program product of item 37 of the patent claim is cleared, the -step contains · means to indicate that the temporary limitation is valid during the transaction period. In the service provider's — 40. If the computer program product of item 36 in the patent claim is declared, cry — mother W today · Used to prompt the user to take turns to send one piece of paper — domain restrictions O: \ 89 \ 89077 DOC! 24605. 41 42 43 44, 45. If the computer program product under the scope of patent application number 40 is further included, it is used to indicate that the restriction of the domain is not a component of the service provider. • If you apply for a computer program product in item 4 丨 of the patent scope, further package 8. It is used to indicate that the domain restriction is a permanent and effective component. Each ... If the computer program product in the scope of application for item 33 of the patent application, further includes the component of _ value used to prompt the user to enter a license condition = the attribute information provider should prompt the user every Received information about the distributability conditions of the message. If the computer program product under the scope of patent application No. 43, further includes: a component to indicate that the license conditions are permanently valid. 3 .: A computer program product in a computer-readable medium for management-user_attribute information in the system. The computer program product includes: a component for receiving a service from a user to a service. One of a resource request from a provider; Substructure: 'Use to determine a set of one or more attribute references related to the user, or one of the attribute information providers is to maintain the attribute information of the user -Service provider; send a request message to the set of one or more attribute information = supplier-the first-attribute information provider in order to retrieve the user's user attribute information; A receiving-response component from the first-attribute information provider to determine that the response message includes a control flag from the first-attribute information O: \ 89 \ 89077.DOC 1246005 The target indicates a condition for obtaining a subsequent request from the service provider to the attribute information provider when the user attribute message of the user is retrieved. 46. The computer program product according to item 45 of the scope of patent application, further comprising: a component 'for stopping the acquisition of user attribute information of the user according to the control flag. Stops the acquisition of user attribute information of the user in accordance with the control flag. 47. If the computer program product of item 45 of the patent application scope, further includes: a component for performing subsequent acquisition of user attribute information of the user according to the control flag. 48. For example, the computer program product under the scope of patent application No. 45, further includes: Component: used to perform a user-specific operation on the resource according to the user attribute information of the user retrieved. 49.-A method for managing user information in a data processing system, the method comprising: determining whether the service provider has not previously been associated with the client, or a group of -users associated with the client-or- After the identifiers of the following: 彳 is a health information provider to select a set of one or more identifiers of the attribute information provider. Each attribute information provider is one of the service providers to maintain the user's information; and The owner sends 〇 \ 89 \ 89077 DOC -9- 1246005 from the attribute described by the service provider user to an attribute information retrieval request message information provider. To a 50. If the scope of the patent application for item 49 provides a user option and the association of the attribute information provider. The method further includes: 51. 52. 53. 54. 55. 56. If the method of selecting one or more identifiers of the use group is continuously related, the method of item 50 of the patent application is further developed. -The step includes ... registering the selection of the set of attribute information providers to the service provider with the service provider. 1LJ The method of claim 50, further comprising: storing the set of one or more characters of the attribute information provider in a constant token on the client. If the method of applying for the scope of the patent application No. 50, the method further includes: storing the set of attribute information providers in the client information container—or multiple identifiers. If the method according to item 49 of the patent application is applied, the method further includes: receiving the set of one or more characters of the attribute information provider from the user as input. If the method in the 49th scope of the patent application is applied, the further step includes: retrieving the set of attribute information providers from the management-configured information—or multiple identifiers. As in the method of applying for the scope of item 49 of the patent, the method further includes: providing a user selection item to select whether to establish with an attribute information provider in the set of one or more identifiers of the attribute information provider— O : \ 89 \ 89077 DOC -10- 1246005 series. 57 · —A device for managing user information, the device includes: a component for receiving a request for a resource of a service provider from a client; a component for determining that the service provider has no previous After the client, or a group of one or more attribute information provider identifiers associated with a user of the client, select a group of one or more attribute information provider identifiers, where each attribute The information provider is a service provider that maintains user attribute information of the user; and a component for sending an attribute information retrieval request message from the service provider to the attribute information provider described by the user. 58. If the device under the scope of patent application No. 57 further includes a component to provide a user selection item to select whether to continuously associate the user with one or more of the language information providers ㈣ The choice of identifier is associated. 59. The device according to item 58 of the scope of patent application, further comprising: a component member for registering the selection of one or more identifiers of the attribute information provider with the service provider. 60. The device according to claim 58 of the patent application scope, further comprising: a component for storing the set of one or more identities of the attribute information provider in the client terminal in a constant token. 61. The device according to item 58 of the scope of patent application, further comprising: a component for storing the set of one or more identifiers of the attribute information provider in the client information container. O: \ 89 \ 89077.DOC Ϊ246005 62 · If the device under the scope of patent application No. 57 further includes: a component for receiving attribute information from the user, the group's one or more identifiers are used as input . 63. The device according to item 57 of the scope of patent application, further comprising: a component for retrieving the set of one or more identifiers of the attribute information provider from the management-configured information. 64. The device according to item 57 of the scope of patent application, further comprising: ―components‖ to provide—user selection items to select whether to provide an attribute information provider with the set of one or more identifiers of the attribute information provider. Establish a relationship. A computer program product in a computer-readable medium for managing user information in a data processing system. The computer program product includes: a component for receiving a resource from a client to a service provider A request; a component for selecting a group of one or more attribute information provider identifiers after determining that the service provider has not previously been associated with the client or a user of the client An identifier of one or more attribute information providers, each of which is a service provider that maintains user attribute information of the user; and a component for sending an attribute information from the service provider Retrieve the request message to an attribute information provider described by a user. 66. The computer program product according to item 65 of the patent application scope, further comprising: a component for providing a user selection item to select whether to continuously identify the user and the set of one or more identifiers of the attribute information provider. O: \ 89 \ 89077.DOC -12- 1246005 Select the relevant beer. 67. The computer program product according to item 66 of the patent application scope, further comprising: a component 'for registering the selection of one or more identifiers of the attribute information provider with the service provider. 68. The computer program product according to item 66 of the patent application scope, further comprising: a component 'for storing the set of one or more identifiers of the attribute information provider in the client in a constant token. 69. The computer program product according to item 66 of the patent application, further comprising a component for storing the set of one or more identifiers of the attribute information provider in a client-side information container. 70. The computer program product according to item 65 of the patent application scope, further comprising: a component for receiving the set of one or more identifiers of the attribute information provider from the user as input. 71 · The computer program product according to item 65 of the scope of patent application, further comprising: a component for retrieving the set of one or more identifiers of the attribute information provider from the management-configured information. 72. If the computer program product under the scope of patent application No. 65, further includes:-a component for providing-a user selection item to choose whether to be in the set of one or more identifiers of the attribute poor information provider-attribute The information provider establishes a relationship. O: \ 89 \ 89077.DOC -13-
TW92130499A 2002-12-31 2003-10-31 Method and system for user-determined attribute storage in a federated environment TWI246005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/334,605 US7797434B2 (en) 2002-12-31 2002-12-31 Method and system for user-determind attribute storage in a federated environment

Publications (2)

Publication Number Publication Date
TW200419379A TW200419379A (en) 2004-10-01
TWI246005B true TWI246005B (en) 2005-12-21

Family

ID=32655106

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92130499A TWI246005B (en) 2002-12-31 2003-10-31 Method and system for user-determined attribute storage in a federated environment

Country Status (4)

Country Link
US (3) US7797434B2 (en)
AU (1) AU2003288465A1 (en)
TW (1) TWI246005B (en)
WO (1) WO2004059530A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI409697B (en) * 2006-05-19 2013-09-21 Ibm Method, system and program product of facilitating storage access within a processing environment
US8644206B2 (en) 2007-08-17 2014-02-04 Qualcomm Incorporated Ad hoc service provider configuration for broadcasting service information
US9179367B2 (en) 2009-05-26 2015-11-03 Qualcomm Incorporated Maximizing service provider utility in a heterogeneous wireless ad-hoc network
US9392445B2 (en) 2007-08-17 2016-07-12 Qualcomm Incorporated Handoff at an ad-hoc mobile service provider

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4485141B2 (en) 2003-04-10 2010-06-16 株式会社日立製作所 Network service disclosure and provision method and program thereof
US7299493B1 (en) * 2003-09-30 2007-11-20 Novell, Inc. Techniques for dynamically establishing and managing authentication and trust relationships
US7467415B2 (en) * 2003-09-30 2008-12-16 Novell, Inc. Distributed dynamic security for document collaboration
US8015301B2 (en) * 2003-09-30 2011-09-06 Novell, Inc. Policy and attribute based access to a resource
US7316027B2 (en) * 2004-02-03 2008-01-01 Novell, Inc. Techniques for dynamically establishing and managing trust relationships
US20070150511A1 (en) * 2004-04-16 2007-06-28 Ruben Laguna-Macias Method and apparatus for handling user's attributes sharing between service providers
KR100644616B1 (en) * 2004-06-10 2006-11-10 삼성전자주식회사 Method for single-sign-on based on markup language, and system for the same
US20060080730A1 (en) * 2004-10-12 2006-04-13 Conor Cahill Affiliations within single sign-on systems
US7788729B2 (en) * 2005-03-04 2010-08-31 Microsoft Corporation Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm
FR2883685A1 (en) * 2005-03-22 2006-09-29 France Telecom Method and system for sharing personal attributes, sharing / insertion / terminal module, internet access provider, proxy server, service provider, and computer program for this method
US7774827B2 (en) * 2005-06-06 2010-08-10 Novell, Inc. Techniques for providing role-based security with instance-level granularity
US20070208750A1 (en) * 2006-03-01 2007-09-06 International Business Machines Corporation Method and system for access to distributed data
US8213583B2 (en) * 2006-11-22 2012-07-03 Verizon Patent And Licensing Inc. Secure access to restricted resource
US8479254B2 (en) 2007-03-16 2013-07-02 Apple Inc. Credential categorization
US8151324B2 (en) 2007-03-16 2012-04-03 Lloyd Leon Burch Remotable information cards
US8108373B2 (en) * 2007-08-29 2012-01-31 International Business Machines Corporation Selecting an author of missing content in a content management system
US7974965B2 (en) * 2007-12-17 2011-07-05 International Business Machines Corporation Federated pagination management
US8646040B2 (en) * 2007-12-31 2014-02-04 International Business Machines Corporation Method and system for securing access to an unsecure network utilizing a transparent identification member
US8302168B2 (en) * 2008-01-18 2012-10-30 Hewlett-Packard Development Company, L.P. Push artifact binding for communication in a federated identity system
US20090217368A1 (en) * 2008-02-27 2009-08-27 Novell, Inc. System and method for secure account reset utilizing information cards
US20090228885A1 (en) * 2008-03-07 2009-09-10 Novell, Inc. System and method for using workflows with information cards
US8079069B2 (en) 2008-03-24 2011-12-13 Oracle International Corporation Cardspace history validator
US8285572B2 (en) * 2008-07-13 2012-10-09 International Business Machines Corporation System and method for solution ordering by federation of order management systems and use of solution records
WO2010067535A1 (en) * 2008-12-08 2010-06-17 日本電気株式会社 Personal information exchanging system, personal information providing apparatus, data processing method therefor, and computer program therefor
US8083135B2 (en) 2009-01-12 2011-12-27 Novell, Inc. Information card overlay
US8632003B2 (en) 2009-01-27 2014-01-21 Novell, Inc. Multiple persona information cards
US20100241868A1 (en) * 2009-03-19 2010-09-23 Hani Nachef Method and apparatus for storing, managing, and securing personal information
CN101572606B (en) * 2009-06-12 2012-05-23 阿里巴巴集团控股有限公司 Method for sending authentication request message in social network and device thereof
WO2010149222A1 (en) * 2009-06-26 2010-12-29 Nokia Siemens Networks Oy Attribute management
CN101635726B (en) * 2009-08-26 2012-07-04 中兴通讯股份有限公司 Service end of C/S architecture and service executing method and service executing system of client
US8799666B2 (en) * 2009-10-06 2014-08-05 Synaptics Incorporated Secure user authentication using biometric information
US10607218B1 (en) * 2011-05-09 2020-03-31 Livingsocial, Inc. Facilitating end-to-end encryption for E-commerce
US8763098B2 (en) * 2011-12-06 2014-06-24 Salesforce.Com, Inc. Mechanism for facilitating dynamic and continuous testing of security assertion markup language credentials in an on-demand services environment
EP2792120A4 (en) 2011-12-12 2015-10-21 Nokia Technologies Oy Method and apparatus for providing federated service accounts
US9047456B2 (en) 2012-03-20 2015-06-02 Canon Information And Imaging Solutions, Inc. System and method for controlling access to a resource
US9589399B2 (en) 2012-07-02 2017-03-07 Synaptics Incorporated Credential quality assessment engine systems and methods
US8560455B1 (en) * 2012-12-13 2013-10-15 Digiboo Llc System and method for operating multiple rental domains within a single credit card domain
US9904793B2 (en) * 2015-03-23 2018-02-27 Intel Corporation Systems, methods, and apparatus to provide private information retrieval
DE102015226454A1 (en) 2015-12-22 2017-06-22 Volkswagen Aktiengesellschaft A method for managing a local copy of a user profile stored in a motor vehicle
DE102016205002A1 (en) 2016-03-24 2017-09-28 Volkswagen Aktiengesellschaft Method for managing collected vehicle data
US10356102B2 (en) * 2017-02-24 2019-07-16 Verizon Patent And Licensing Inc. Permissions using blockchain
TWI674508B (en) * 2018-11-01 2019-10-11 財團法人資訊工業策進會 Data providing system and data providing method thereof

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185184B1 (en) 1995-09-25 2001-02-06 Netspeak Corporation Directory server for providing dynamically assigned network protocol addresses
US5968126A (en) 1997-04-02 1999-10-19 Switchsoft Systems, Inc. User-based binding of network stations to broadcast domains
US6105131A (en) * 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system
US20020004783A1 (en) * 1997-11-12 2002-01-10 Cris T. Paltenghe Virtual wallet system
EP0917119A3 (en) 1997-11-12 2001-01-10 Citicorp Development Center, Inc. Distributed network based electronic wallet
US6119160A (en) 1998-10-13 2000-09-12 Cisco Technology, Inc. Multiple-level internet protocol accounting
US6678731B1 (en) * 1999-07-08 2004-01-13 Microsoft Corporation Controlling access to a network server using an authentication ticket
EP1077419A3 (en) 1999-08-17 2004-04-14 Citibank, N.A. System and method for use of distributed electronic wallets
US6449621B1 (en) 1999-11-03 2002-09-10 Ford Global Technologies, Inc. Privacy data escrow system and method
WO2001050299A2 (en) 1999-12-29 2001-07-12 Pango Systems B.V. System and method for incremental disclosure of personal information to content providers
WO2001065340A2 (en) 2000-02-28 2001-09-07 Edentity Limited Information processing system and method
GB2364482B (en) 2000-06-30 2002-10-09 Motorola Inc Server-based electronic wallet system
US20020091646A1 (en) * 2000-11-03 2002-07-11 Lake Lawrence L. Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction
US20020133719A1 (en) * 2001-03-14 2002-09-19 Jay Westerdal Method and apparatus for sharing authentication information between multiple servers
AU2002344299A1 (en) * 2001-05-29 2002-12-09 Xenobit Corporation Method and system for logging into and providing access to a computer system via a communications network
EP1417555A2 (en) * 2001-06-18 2004-05-12 Daon Holdings Limited An electronic data vault providing biometrically protected electronic signatures
US7552056B2 (en) * 2001-09-25 2009-06-23 Emc Corporation Scalable storage service registration application
US7085840B2 (en) * 2001-10-29 2006-08-01 Sun Microsystems, Inc. Enhanced quality of identification in a data communications network
US20030139934A1 (en) * 2001-12-20 2003-07-24 Intel Corporation Requesting and providing services via a registry
CN100481785C (en) * 2001-12-27 2009-04-22 兄弟工业株式会社 Network and terminal equipment
US7523490B2 (en) * 2002-05-15 2009-04-21 Microsoft Corporation Session key security protocol

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI409697B (en) * 2006-05-19 2013-09-21 Ibm Method, system and program product of facilitating storage access within a processing environment
US8644206B2 (en) 2007-08-17 2014-02-04 Qualcomm Incorporated Ad hoc service provider configuration for broadcasting service information
US9167426B2 (en) 2007-08-17 2015-10-20 Qualcomm Incorporated Ad hoc service provider's ability to provide service for a wireless network
US9392445B2 (en) 2007-08-17 2016-07-12 Qualcomm Incorporated Handoff at an ad-hoc mobile service provider
US9398453B2 (en) 2007-08-17 2016-07-19 Qualcomm Incorporated Ad hoc service provider's ability to provide service for a wireless network
US9179367B2 (en) 2009-05-26 2015-11-03 Qualcomm Incorporated Maximizing service provider utility in a heterogeneous wireless ad-hoc network

Also Published As

Publication number Publication date
AU2003288465A1 (en) 2004-07-22
US7797434B2 (en) 2010-09-14
US20100287291A1 (en) 2010-11-11
WO2004059530A1 (en) 2004-07-15
US8122138B2 (en) 2012-02-21
TW200419379A (en) 2004-10-01
US20100287235A1 (en) 2010-11-11
US8060632B2 (en) 2011-11-15
US20040128378A1 (en) 2004-07-01

Similar Documents

Publication Publication Date Title
US20160352717A1 (en) Remote access of digital identities
US9092637B2 (en) Profile and consent accrual
CN105659558B (en) Computer implemented method, authorization server and computer-readable memory
US9992206B2 (en) Enhanced security for electronic communications
US10574646B2 (en) Managing authorized execution of code
US10333941B2 (en) Secure identity federation for non-federated systems
US9165291B1 (en) Payment transaction by email
US10540484B2 (en) Networked services licensing system and method
CN104255007B (en) OAUTH frameworks
US20180060761A1 (en) Digital rights management (drm)-enabled policy management for an identity provider in a federated environment
CN103460215B (en) Access to use the method for locked resource of end user for being served by providing authorizing
EP2689372B1 (en) User to user delegation service in a federated identity management environment
US8997196B2 (en) Flexible end-point compliance and strong authentication for distributed hybrid enterprises
EP2643955B1 (en) Methods for authorizing access to protected content
US8756661B2 (en) Dynamic user authentication for access to online services
US9002018B2 (en) Encryption key exchange system and method
US7441263B1 (en) System, method and computer program product for providing unified authentication services for online applications
US7676675B2 (en) Architecture for connecting a remote client to a local client desktop
JP5432888B2 (en) Granting access to web service resources
KR101486613B1 (en) Transferable restricted security tokens
US6782379B2 (en) Preparing output XML based on selected programs and XML templates
US7415607B2 (en) Obtaining and maintaining real time certificate status
US7330971B1 (en) Delegated administration of namespace management
US8528058B2 (en) Native use of web service protocols and claims in server authentication
US7240362B2 (en) Providing identity-related information and preventing man-in-the-middle attacks

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees